Abstract
This paper presents a hardware isolation mechanism to protect secret information in third party IP cores subject to hardware Trojan attacks. We first ......
小提示:本篇文献需要登录阅读全文,点击跳转登录