Gookyi, D. A. N., & Ryoo, K. (2019). A Low-cost Hardware Trojan Mitigation Method for Securing Untrusted ThirdParty Cryptographic Intellectual Property Cores. International Journal of Advanced Science and Technology, 28(5), 32 - 43. Retrieved from http://sersc.org/journals/index.php/IJAST/article/view/271