Untrusted Third Party Digital IP Cores

  • Power-Delay Trade-off Driven Exploration of Hardware Trojan Secured Datapath during High Level Synthesis
  • Anirban Sengupta, Saumya Bhadauria
  • May 2015, ACM (Association for Computing Machinery)
  • DOI: 10.1145/2742060.2742061

The authors haven't finished explaining this publication. If you are the author, sign in to claim or explain your work.

Read Publication

http://dx.doi.org/10.1145/2742060.2742061

The following have contributed to this page: Professor Anirban Sengupta