Gookyi, D. A. N. and Ryoo, K. (2019) “A Low-cost Hardware Trojan Mitigation Method for Securing Untrusted ThirdParty Cryptographic Intellectual Property Cores”, International Journal of Advanced Science and Technology, 28(5), pp. 32 - 43. Available at: http://sersc.org/journals/index.php/IJAST/article/view/271 (Accessed: 9April2026).