↓ Skip to main content

Hardware Protection through Obfuscation

Overview of attention for book
Attention for Chapter 5: Permutation-Based Obfuscation
Altmetric Badge

Citations

dimensions_citation
49 Dimensions

Readers on

mendeley
2 Mendeley