Login / Signup
Higher security of ASIC fabrication process against reverse engineering attack using automatic netlist encryption methodology.
Sharareh Zamanzadeh
Ali Jahanian
Published in:
Microprocess. Microsystems (2016)
Keyphrases
</>
reverse engineering
integrated circuit
reverse engineer
software product
software engineering
encryption decryption
access control
software maintenance
key management
object oriented
conceptual model
gene regulatory networks
database systems
secret key
encryption algorithms
data encryption
security properties
encryption algorithm
authentication protocol
data model