Re-imagining the security of the Hardware using Lookup Table Obfuscation

From Femi-Jide Akinmoladun  

views comments