Behavioral Synthesis for Hardware Security 2021
DOI: 10.1007/978-3-030-78841-4_7
|View full text |Cite
|
Sign up to set email alerts
|

Hardware (IP) Watermarking During Behavioral Synthesis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 17 publications
0
0
0
Order By: Relevance
“…Tis is due to the well-known fact that each watermark integration method exhibits specifc latency and area overhead, and therefore, selecting an appropriate method for embedding the watermark plays a crucial role. A variety of high-level synthesis-based techniques for IP protection is well described in the literature [13][14][15][16][17][18]. For reusable IP cores, the techniques based on single-phase, triple-phase watermarking, digital signature-based watermarking, binary encoding-based watermarking, and in-synthesis-based watermarking are described.…”
Section: Introductionmentioning
confidence: 99%
“…Tis is due to the well-known fact that each watermark integration method exhibits specifc latency and area overhead, and therefore, selecting an appropriate method for embedding the watermark plays a crucial role. A variety of high-level synthesis-based techniques for IP protection is well described in the literature [13][14][15][16][17][18]. For reusable IP cores, the techniques based on single-phase, triple-phase watermarking, digital signature-based watermarking, binary encoding-based watermarking, and in-synthesis-based watermarking are described.…”
Section: Introductionmentioning
confidence: 99%