[1]
D. A. N. Gookyi and K. Ryoo, “A Low-cost Hardware Trojan Mitigation Method for Securing Untrusted ThirdParty Cryptographic Intellectual Property Cores”, IJAST, vol. 28, no. 5, pp. 32 - 43, Sep. 2019.