Gookyi, D. A. N., and K. Ryoo. “A Low-Cost Hardware Trojan Mitigation Method for Securing Untrusted ThirdParty Cryptographic Intellectual Property Cores”. International Journal of Advanced Science and Technology, Vol. 28, no. 5, Sept. 2019, pp. 32 -43, http://sersc.org/journals/index.php/IJAST/article/view/271.