Protecting Behavioral IPs During Design Time: Key-Based Obfuscation Techniques for HLS in the Cloud

Behavioral Synthesis for Hardware Security(2021)

引用 0|浏览1
暂无评分
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络