{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T04:41:56Z","timestamp":1764996116849,"version":"3.41.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1109\/reconfig.2016.7857187","type":"proceedings-article","created":{"date-parts":[[2017,2,16]],"date-time":"2017-02-16T22:20:29Z","timestamp":1487283629000},"page":"1-8","source":"Crossref","is-referenced-by-count":42,"title":["Robust bitstream protection in FPGA-based systems through low-overhead obfuscation"],"prefix":"10.1109","author":[{"given":"Robert","family":"Karam","sequence":"first","affiliation":[]},{"given":"Tamzidul","family":"Hoque","sequence":"additional","affiliation":[]},{"given":"Sandip","family":"Ray","sequence":"additional","affiliation":[]},{"given":"Mark","family":"Tehranipoor","sequence":"additional","affiliation":[]},{"given":"Swarup","family":"Bhunia","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"365","article-title":"Dark silicon and the end of multicore scaling","author":"esmaeilzadeh","year":"2011","journal-title":"2011 38th Annual International Symposium on Computer Architecture (ISCA) ISCA"},{"journal-title":"Altera","article-title":"Cyclone V Device Handbook","year":"2015","key":"ref11"},{"key":"ref12","first-page":"535","article-title":"Balancing Logic Utilization and Area Efficiency in FPGAs","author":"tessier","year":"2000","journal-title":"FPL Springer"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/VLSID.2016.61"},{"journal-title":"Logic Synthesis and Optimization Benchmarks User Guide Version 3 0 Microelectronics Center of North Carolina (MCNC)","year":"1991","author":"yang","key":"ref14"},{"journal-title":"EPFL","article-title":"The EPFL Combinational Benchmark Suite","year":"0","key":"ref15"},{"key":"ref16","first-page":"302","article-title":"PUFKY: A Fully Functional PUF-based Cryptographic Key Generator","author":"maes","year":"2012","journal-title":"CHES Springer"},{"key":"ref17","first-page":"213","article-title":"VPR: A New Packing, Placement and Routing Tool for FPGA Research","author":"betz","year":"1997","journal-title":"FPL Springer"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.21236\/ADA606736"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"753","DOI":"10.1145\/996566.996771","article-title":"Security as a New Dimension in Embedded System Design","author":"kocher","year":"2004","journal-title":"DAC ACM"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2007.912030"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046722"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2013.2247460"},{"key":"ref8","first-page":"264","article-title":"From the Bitstream to the Netlist","author":"rannaud","year":"2008","journal-title":"ACM FPGA"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1403375.1403631"},{"key":"ref2","first-page":"195","article-title":"FPGA-oriented Security","author":"majzoobi","year":"2011","journal-title":"Introduction to Hardware Security and Trust"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1186\/1687-3963-2006-056320"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2399455"}],"event":{"name":"2016 International Conference on ReConFigurable Computing and FPGAs (ReConFig)","start":{"date-parts":[[2016,11,30]]},"location":"Cancun, Mexico","end":{"date-parts":[[2016,12,2]]}},"container-title":["2016 International Conference on ReConFigurable Computing and FPGAs (ReConFig)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7838017\/7856931\/07857187.pdf?arnumber=7857187","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,15]],"date-time":"2025-06-15T12:41:48Z","timestamp":1749991308000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7857187\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/reconfig.2016.7857187","relation":{},"subject":[],"published":{"date-parts":[[2016,11]]}}}