2018 19th International Symposium on Quality Electronic Design (ISQED) 2018
DOI: 10.1109/isqed.2018.8357321
|View full text |Cite
|
Sign up to set email alerts
|

High-level synthesis of key based obfuscated RTL datapaths

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
2
1

Relationship

4
5

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 20 publications
0
7
0
Order By: Relevance
“…A strong PUF can support a large number of complex CRPs with physical access to the PUF for a query such that an attacker cannot generate correct response given finite resources and time [14,17,31]. While a weak PUF has only a few CRPs, which makes it difficult for the attack and prediction techniques, hence in this paper, we consider strong PUF.…”
Section: Strong Puf Architecturesmentioning
confidence: 99%
“…A strong PUF can support a large number of complex CRPs with physical access to the PUF for a query such that an attacker cannot generate correct response given finite resources and time [14,17,31]. While a weak PUF has only a few CRPs, which makes it difficult for the attack and prediction techniques, hence in this paper, we consider strong PUF.…”
Section: Strong Puf Architecturesmentioning
confidence: 99%
“…Strong PUFs: A strong PUF can support a large number of complex CRPs with physical access to the PUF for a query such that an attacker cannot generate correct response given finite resources and time [17]- [19]. While a weak PUF has only few CRPs which makes it difficult for the attack and prediction techniques, hence in this paper we consider strong PUF.…”
Section: Background and Related Workmentioning
confidence: 99%
“…In [7] and [8], high-level transformations are used to protect digital signal processing (DSP) circuits. In [9] and [10], keybased obfuscation is added during HLS by extending the HLS process. In these works, the goal is to obtain obfuscated RTL and to provide protection during manufacturing or for thirdparty vendors of IPs, and HLS is considered to be a trusted design step.…”
Section: A Ip Protectionmentioning
confidence: 99%