Articles with "using hlt" as a keyword



Photo by quinguyen from unsplash

Protecting IP core during architectural synthesis using HLT-based obfuscation

Sign Up to like & get
recommendations!
Published in 2017 at "Electronics Letters"

DOI: 10.1049/el.2017.1329

Abstract: For protecting an intellectual property (IP) core, it must be harder to reverse engineer. Structural obfuscation can play an important role in achieving this goal. A novel structural obfuscation methodology during architectural synthesis using multiple… read more here.

Keywords: using hlt; methodology; architectural synthesis; synthesis using ... See more keywords