Requirements: .PDF reader, 72.6 MB
Overview: This book demonstrates the breadth and depth of IP protection through logic locking, considering both attacker/adversary and defender/designer perspectives. The authors draw a semi-chronological picture of the evolution of logic locking during the last decade, gathering and describing all the DO’s and DON’Ts in this approach. They describe simple-to-follow scenarios and guide readers to navigate/identify threat models and design/evaluation flow for further studies. Readers will gain a comprehensive understanding of all fundamentals of logic locking.
Genre: Non-Fiction > Educational
Download Instructions:
https://ouo.io/5zgfFY
https://ouo.io/B0Pf5f
https://ouo.io/oM2172.