Login / Signup
Provably secure camouflaging strategy for IC protection.
Meng Li
Kaveh Shamsi
Travis Meade
Zheng Zhao
Bei Yu
Yier Jin
David Z. Pan
Published in:
ICCAD (2016)
Keyphrases
</>
provably secure
public key
standard model
key management
blind signature
real time
information systems
information security
hash functions