Quantifying Security and Overheads for Obfuscation of Integrated Circuits. Venugopalan, V., Kolhe, G., Schmidt, A., Hu, Y., Beerel, P. A, Nuzzo, P., Monson, J., & French, M. March 2019. doi bibtex @conference{Venugopalan2019Quantifying-Sec,
author = {Venugopalan, Vivek and Kolhe, Gaurav and Schmidt, Andrew and Hu, Yinghua and Beerel, Peter A and Nuzzo, Pierluigi and Monson, Joshua and French, Matthew},
booktitle = {Government Microcircuit Applications \& Critical Techology Conference (GOMACTech)},
date-added = {2020-01-20 18:26:09 -0500},
date-modified = {2020-01-20 18:26:09 -0500},
doi = {https://apps.dtic.mil/docs/citations/AD1075410},
keywords = {intellectual property , cryptography , reverse engineering , semiconductors , signal processing , algorithms , dynamic range , standards , manufacturing , integrated circuits , fabrication , databases , linear programming , integer programming , security},
month = mar,
title = {{Quantifying Security and Overheads for Obfuscation of Integrated Circuits}},
year = {2019},
Bdsk-Url-1 = {https://apps.dtic.mil/docs/citations/AD1075410}}
Downloads: 0
{"_id":"ZTgwmXwuGWQpfQT3o","bibbaseid":"venugopalan-kolhe-schmidt-hu-beerel-nuzzo-monson-french-quantifyingsecurityandoverheadsforobfuscationofintegratedcircuits-2019","author_short":["Venugopalan, V.","Kolhe, G.","Schmidt, A.","Hu, Y.","Beerel, P. A","Nuzzo, P.","Monson, J.","French, M."],"bibdata":{"bibtype":"conference","type":"conference","author":[{"propositions":[],"lastnames":["Venugopalan"],"firstnames":["Vivek"],"suffixes":[]},{"propositions":[],"lastnames":["Kolhe"],"firstnames":["Gaurav"],"suffixes":[]},{"propositions":[],"lastnames":["Schmidt"],"firstnames":["Andrew"],"suffixes":[]},{"propositions":[],"lastnames":["Hu"],"firstnames":["Yinghua"],"suffixes":[]},{"propositions":[],"lastnames":["Beerel"],"firstnames":["Peter","A"],"suffixes":[]},{"propositions":[],"lastnames":["Nuzzo"],"firstnames":["Pierluigi"],"suffixes":[]},{"propositions":[],"lastnames":["Monson"],"firstnames":["Joshua"],"suffixes":[]},{"propositions":[],"lastnames":["French"],"firstnames":["Matthew"],"suffixes":[]}],"booktitle":"Government Microcircuit Applications & Critical Techology Conference (GOMACTech)","date-added":"2020-01-20 18:26:09 -0500","date-modified":"2020-01-20 18:26:09 -0500","doi":"https://apps.dtic.mil/docs/citations/AD1075410","keywords":"intellectual property , cryptography , reverse engineering , semiconductors , signal processing , algorithms , dynamic range , standards , manufacturing , integrated circuits , fabrication , databases , linear programming , integer programming , security","month":"March","title":"Quantifying Security and Overheads for Obfuscation of Integrated Circuits","year":"2019","bdsk-url-1":"https://apps.dtic.mil/docs/citations/AD1075410","bibtex":"@conference{Venugopalan2019Quantifying-Sec,\n\tauthor = {Venugopalan, Vivek and Kolhe, Gaurav and Schmidt, Andrew and Hu, Yinghua and Beerel, Peter A and Nuzzo, Pierluigi and Monson, Joshua and French, Matthew},\n\tbooktitle = {Government Microcircuit Applications \\& Critical Techology Conference (GOMACTech)},\n\tdate-added = {2020-01-20 18:26:09 -0500},\n\tdate-modified = {2020-01-20 18:26:09 -0500},\n\tdoi = {https://apps.dtic.mil/docs/citations/AD1075410},\n\tkeywords = {intellectual property , cryptography , reverse engineering , semiconductors , signal processing , algorithms , dynamic range , standards , manufacturing , integrated circuits , fabrication , databases , linear programming , integer programming , security},\n\tmonth = mar,\n\ttitle = {{Quantifying Security and Overheads for Obfuscation of Integrated Circuits}},\n\tyear = {2019},\n\tBdsk-Url-1 = {https://apps.dtic.mil/docs/citations/AD1075410}}\n\n","author_short":["Venugopalan, V.","Kolhe, G.","Schmidt, A.","Hu, Y.","Beerel, P. A","Nuzzo, P.","Monson, J.","French, M."],"bibbaseid":"venugopalan-kolhe-schmidt-hu-beerel-nuzzo-monson-french-quantifyingsecurityandoverheadsforobfuscationofintegratedcircuits-2019","role":"author","urls":{},"keyword":["intellectual property","cryptography","reverse engineering","semiconductors","signal processing","algorithms","dynamic range","standards","manufacturing","integrated circuits","fabrication","databases","linear programming","integer programming","security"],"metadata":{"authorlinks":{}}},"bibtype":"conference","biburl":"https://bibbase.org/f/R3LGkkqj3uPfqr3NM/vivekv-isi-edu.bib","dataSources":["i5A8jKqyW67R7nn75","oodiEqv3HQNeZtGeC"],"keywords":["intellectual property","cryptography","reverse engineering","semiconductors","signal processing","algorithms","dynamic range","standards","manufacturing","integrated circuits","fabrication","databases","linear programming","integer programming","security"],"search_terms":["quantifying","security","overheads","obfuscation","integrated","circuits","venugopalan","kolhe","schmidt","hu","beerel","nuzzo","monson","french"],"title":"Quantifying Security and Overheads for Obfuscation of Integrated Circuits","year":2019}