2019
DOI: 10.1007/978-981-13-5826-5_40
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Circuits for Security Using Logic Encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 9 publications
0
2
0
Order By: Relevance
“…Early sowing resulted in taller plants because of a longer growth cycle and favorable weather, which favored profuse vegetative growth whereas late sowing experienced comparatively lower temperatures during the later growth stages resulting in a lower height of the crop. 21,22 At all phenological stages of the crop, weed management strategies had a substantial effect on plant height. Effective weed management through conoweeding (equivalent to weed free) could explain this development with repetitive mechanized weedings at 15, 30, 45, and 60 DAS that helped in keeping the crop free of weeds up to the critical stage of cropweed interference resulting in efficient nutrient uptake and development of the crop.…”
Section: ■ Discussionmentioning
confidence: 99%
“…Early sowing resulted in taller plants because of a longer growth cycle and favorable weather, which favored profuse vegetative growth whereas late sowing experienced comparatively lower temperatures during the later growth stages resulting in a lower height of the crop. 21,22 At all phenological stages of the crop, weed management strategies had a substantial effect on plant height. Effective weed management through conoweeding (equivalent to weed free) could explain this development with repetitive mechanized weedings at 15, 30, 45, and 60 DAS that helped in keeping the crop free of weeds up to the critical stage of cropweed interference resulting in efficient nutrient uptake and development of the crop.…”
Section: ■ Discussionmentioning
confidence: 99%
“…Therefore, not all the inputs are utilized in overall circuits so that all the unused inputs are framed as a sub-circuit module function to reduce the area and also obtain the security of a processor. These methods are efficient in security to confuse attackers which are complex to identify a circuit functionality which is presented by Chandini et al [15]. Lao et al [16] performed logic locking (LL) techniques for digital signal processing applications which is inspired from the cyber security competitions.…”
Section: Related Workmentioning
confidence: 99%