-
1
-
-
0000608018
-
Transaction security system
-
D.G. Abraham, G.M. Dolan, G.P. Double, and J.V. Stevens. Transaction security system. IBM Systems Journal, 30(2):206–229, 1991.
-
(1991)
IBM Systems Journal
, vol.30
, Issue.2
, pp. 206-229
-
-
Abraham, D.G.1
Dolan, G.M.2
Double, G.P.3
Stevens, J.V.4
-
4
-
-
33748535403
-
High-performance CMOS variability in the 65-nm regime and beyond
-
K. Bernstein, D.J. Frank, A.E. Gattiker, W. Haensch, B.L. Ji, S.R. Nassif, E.J. Nowak, D.J. Pearson, and N.J. Rohrer. High-performance CMOS variability in the 65-nm regime and beyond. IBM Journal of Research and Development, 50(4/5):433–450, 2006.
-
(2006)
IBM Journal of Research and Development
, vol.50
, Issue.4-5
, pp. 433-450
-
-
Bernstein, K.1
Frank, D.J.2
Gattiker, A.E.3
Haensch, W.4
Ji, B.L.5
Nassif, S.R.6
Nowak, E.J.7
Pearson, D.J.8
Rohrer, N.J.9
-
7
-
-
0029231165
-
Optimizing power using transformations
-
A.P. Chandrakasan, M. Potkonjak, R. Mehra, J. Rabaey, and R.W. Brodersen. Optimizing power using transformations. IEEE Trans. CAD of Integrated Circuits and Systems, 14(1):12–31, 1995.
-
(1995)
IEEE Trans. CAD of Integrated Circuits and Systems
, vol.14
, Issue.1
, pp. 12-31
-
-
Chandrakasan, A.P.1
Potkonjak, M.2
Mehra, R.3
Rabaey, J.4
Brodersen, R.W.5
-
9
-
-
4344587804
-
-
John Wiley & Sons
-
B. Gassend, D. Lim, D. Clarke, M. van Dijk, and S. Devadas. Concurrency and Computation: Practice and Experience, volume 16, chapter Identification and authentication of integrated circuits, pages 1077–1098. John Wiley & Sons, 2004.
-
(2004)
Concurrency and Computation: Practice and Experience, Volume 16, Chapter Identification and Authentication of Integrated Circuits
, pp. 1077-1098
-
-
Gassend, B.1
Lim, D.2
Clarke, D.3
van Dijk, M.4
Devadas, S.5
-
11
-
-
0031619176
-
Watermarking techniques for intellectual property protection
-
A. Kahng, J. Lach, W. Mangione-Smith, S. Mantik, I. Markov, M. Potkonjak, P. Tucker, H. Wang, and G. Wolfe. Watermarking techniques for intellectual property protection. In Design Automation Conference (DAC), pages 776–781, 1998.
-
(1998)
Design Automation Conference (DAC)
, pp. 776-781
-
-
Kahng, A.1
Lach, J.2
Mangione-Smith, W.3
Mantik, S.4
Markov, I.5
Potkonjak, M.6
Tucker, P.7
Wang, H.8
Wolfe, G.9
-
12
-
-
0032320166
-
Intellectual property protection by watermarking combinational logic synthesis solutions
-
D. Kirovski, Y.-Y. Hwang, M. Potkonjak, and J. Cong. Intellectual property protection by watermarking combinational logic synthesis solutions. In International Conference on Computer Aided Design (ICCAD), pages 194–198, 1998.
-
(1998)
International Conference on Computer Aided Design (ICCAD)
, pp. 194-198
-
-
Kirovski, D.1
Hwang, Y.-Y.2
Potkonjak, M.3
Cong, J.4
-
13
-
-
0141517673
-
Local watermarks: Methodology and application to behavioral synthesis
-
D. Kirovski and M. Potkonjak. Local watermarks: methodology and application to behavioral synthesis. IEEE Trans. CAD, 22(9):1277–1283, 2003.
-
(2003)
IEEE Trans. CAD
, vol.22
, Issue.9
, pp. 1277-1283
-
-
Kirovski, D.1
Potkonjak, M.2
-
15
-
-
33745218297
-
Behavioral synthesis techniques for intellectual property protection
-
F. Koushanfar, I. Hong, and M. Potkonjak. Behavioral synthesis techniques for intellectual property protection. ACM Trans. Design Automation of Electronic Systems, 10(3):523–545, 2005.
-
(2005)
ACM Trans. Design Automation of Electronic Systems
, vol.10
, Issue.3
, pp. 523-545
-
-
Koushanfar, F.1
Hong, I.2
Potkonjak, M.3
-
19
-
-
4544381402
-
A technique to build a secret key in integrated circuits for identification and authentication applications
-
J.W. Lee, L. Daihyun, B. Gassend, G.E. Suh, M. van Dijk, and S. Devadas. A technique to build a secret key in integrated circuits for identification and authentication applications. In Symposium of VLSI Circuits, pages 176–179, 2004.
-
(2004)
Symposium of VLSI Circuits
, pp. 176-179
-
-
Lee, J.W.1
Daihyun, L.2
Gassend, B.3
Suh, G.E.4
van Dijk, M.5
Devadas, S.6
-
21
-
-
0041663673
-
An artificial fingerprint device (AFD): A study of identification number applications utilizing characteristics variation of polycrystalline silicon TFTs
-
S. Maeda, H. Kuriyama, T. Ipposhi, S. Maegawa, Y. Inoue, M. Inuishi, N. Kotani, and T. Nishimura. An artificial fingerprint device (AFD): a study of identification number applications utilizing characteristics variation of polycrystalline silicon TFTs. IEEE Trans. Electron Devices, 50(6):1451–1458, 2003.
-
(2003)
IEEE Trans. Electron Devices
, vol.50
, Issue.6
, pp. 1451-1458
-
-
Maeda, S.1
Kuriyama, H.2
Ipposhi, T.3
Maegawa, S.4
Inoue, Y.5
Inuishi, M.6
Kotani, N.7
Nishimura, T.8
-
22
-
-
0035440030
-
Techniques for the creation of digital watermarks in sequential circuit designs
-
A. Oliveira. Techniques for the creation of digital watermarks in sequential circuit designs. IEEE Trans. CAD of Integrated Circuits and Systems, 20(9):1101–1117, 2001.
-
(2001)
IEEE Trans. CAD of Integrated Circuits and Systems
, vol.20
, Issue.9
, pp. 1101-1117
-
-
Oliveira, A.1
-
24
-
-
22244484728
-
Where do the dopants go?
-
S. Roy and A. Asenov. Where do the dopants go? Science, 309(5733):388–390, 2005.
-
(2005)
Science
, vol.309
, Issue.5733
, pp. 388-390
-
-
Roy, S.1
Asenov, A.2
-
25
-
-
0025561399
-
On the optimization power of retiming and resynthesis transformations
-
H. Savoj and R.K. Brayton. On the optimization power of retiming and resynthesis transformations. In Design Automation Conference (DAC), pages 297–301, 1990.
-
(1990)
Design Automation Conference (DAC)
, pp. 297-301
-
-
Savoj, H.1
Brayton, R.K.2
-
26
-
-
0003934798
-
-
Technical Report UCB/ERL M92/41, EECS Department, University of California, Berkeley
-
E.M. Sentovich, K.J. Singh, L. Lavagno, C. Moon, R. Murgai, A. Saldanha, H. Savoj, P.R. Stephan, R.K. Brayton, and A.L. Sangiovanni-Vincentelli. SIS: A system for sequential circuit synthesis. Technical Report UCB/ERL M92/41, EECS Department, University of California, Berkeley, 1992.
-
(1992)
SIS: A System for Sequential Circuit Synthesis
-
-
Sentovich, E.M.1
Singh, K.J.2
Lavagno, L.3
Moon, C.4
Murgai, R.5
Saldanha, A.6
Savoj, H.7
Stephan, P.R.8
Brayton, R.K.9
Sangiovanni-Vincentelli, A.L.10
-
29
-
-
27544441530
-
Design and implementation of the aegis single-chip secure processor using physical random functions
-
G.E. Suh, C.W. O’Donnell, I. Sachdev, and S. Devadas. Design and implementation of the aegis single-chip secure processor using physical random functions. In International Symposium on Computer Architecture (ISCA), pages 25–36, 2005.
-
(2005)
International Symposium on Computer Architecture (ISCA)
, pp. 25-36
-
-
Suh, G.E.1
O’Donnell, C.W.2
Sachdev, I.3
Devadas, S.4
-
30
-
-
0033879740
-
Watermarking-based copyright protection of sequential functions
-
I. Torunoglu and E. Charbon. Watermarking-based copyright protection of sequential functions. IEEE Journal of Solid-State Circuits (JSSC), 35(3):434–440, 2000.
-
(2000)
IEEE Journal of Solid-State Circuits (JSSC)
, vol.35
, Issue.3
, pp. 434-440
-
-
Torunoglu, I.1
Charbon, E.2
-
32
-
-
8344275946
-
Fair watermarking using combinatorial isolation lemmas
-
J.L. Wong, R. Majumdar, and M. Potkonjak. Fair watermarking using combinatorial isolation lemmas. IEEE Trans. CAD, 23(11):1566–1574, 2004.
-
(2004)
IEEE Trans. CAD
, vol.23
, Issue.11
, pp. 1566-1574
-
-
Wong, J.L.1
Majumdar, R.2
Potkonjak, M.3
|