An evolutionary approach to hardware encryption and Trojan-horse mitigation
Keyword(s):
Keyword(s):
2020 ◽
Vol 5
(1)
◽
pp. 33-37
Keyword(s):
2016 ◽
Vol 3
(1)
◽
pp. 7-15
Keyword(s):
2010 ◽
Vol 65
(1)
◽
pp. 65-83
◽
2015 ◽
Vol 2
(1-2)
◽
pp. 161-166
◽
Keyword(s):
Keyword(s):