Cited By
View all- Gubbi KLatibari BChowdhury MJalilzadeh AHamedani ERafatirad SSasan AHomayoun HSalehi S(2024)Optimized and Automated Secure IC Design Flow: A Defense-in-Depth ApproachIEEE Transactions on Circuits and Systems I: Regular Papers10.1109/TCSI.2024.336416071:5(2031-2044)Online publication date: May-2024
- Karn RSinanoglu O(2024)Locking Decision Tree with State Permutation Obfuscation: Software Implementation2024 22nd IEEE Interregional NEWCAS Conference (NEWCAS)10.1109/NewCAS58973.2024.10666302(353-357)Online publication date: 16-Jun-2024
- Hossain MChowdhury MDeMara RSalehi S(2024)Sensitivity Analysis of SOT-MTJs to Manufacturing Process Variation: A Hardware Security Perspective2024 25th International Symposium on Quality Electronic Design (ISQED)10.1109/ISQED60706.2024.10528782(1-5)Online publication date: 3-Apr-2024
- Show More Cited By