no code implementations • 14 Nov 2017 • Satwik Patnaik, Mohammed Ashraf, Johann Knechtel, Ozgur Sinanoglu
Our scheme is based on obfuscating the interconnects (BEOL); it can be readily applied to any design without modifications in the device layer (FEOL).
Cryptography and Security