Transient Key-Based Obfuscation For Hls In An Untrusted Cloud Environment
2019 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE)(2019)
Key words
High-Level Synthesis, Cloud, IP theft, Obfuscation
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined