ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2209.01711
  4. Cited By
Hide & Seek: Seeking the (Un)-Hidden key in Provably-Secure Logic
  Locking Techniques

Hide & Seek: Seeking the (Un)-Hidden key in Provably-Secure Logic Locking Techniques

5 September 2022
Satwik Patnaik
Nimisha Limaye
Ozgur Sinanoglu
ArXiv (abs)PDFHTML

Papers citing "Hide & Seek: Seeking the (Un)-Hidden key in Provably-Secure Logic Locking Techniques"

3 / 3 papers shown
Title
SubLock: Sub-Circuit Replacement based Input Dependent Key-based Logic
  Locking for Robust IP Protection
SubLock: Sub-Circuit Replacement based Input Dependent Key-based Logic Locking for Robust IP Protection
V. Rathor
Munesh Singh
Kshira Sagar Sahoo
Saraju Mohanty
141
1
0
27 Jun 2024
CAC 2.0: A Corrupt and Correct Logic Locking Technique Resilient to
  Structural Analysis Attacks
CAC 2.0: A Corrupt and Correct Logic Locking Technique Resilient to Structural Analysis Attacks
Levent Aksoy
Muhammad Yasin
S. Pagliarini
19
1
0
13 Jan 2024
KRATT: QBF-Assisted Removal and Structural Analysis Attack Against Logic
  Locking
KRATT: QBF-Assisted Removal and Structural Analysis Attack Against Logic Locking
Levent Aksoy
Muhammad Yasin
S. Pagliarini
16
4
0
10 Nov 2023
1