1. Abdulrahman Alaql, Domenic Forte, and Swarup Bhunia. 2019 . Sweep to the secret: A constant propagation attack on logic locking . In 2019 Asian Hardware Oriented Security and Trust Symposium (AsianHOST). IEEE, 1--6. Abdulrahman Alaql, Domenic Forte, and Swarup Bhunia. 2019. Sweep to the secret: A constant propagation attack on logic locking. In 2019 Asian Hardware Oriented Security and Trust Symposium (AsianHOST). IEEE, 1--6.
2. B. Shakya 2017 . Introduction to Hardware Obfuscation: Motivation, Methods and Evaluation. In Hardware Protection through Obfuscation . Springer , 3--32. B. Shakya et al. 2017. Introduction to Hardware Obfuscation: Motivation, Methods and Evaluation. In Hardware Protection through Obfuscation. Springer, 3--32.
3. F. Emnett and M. Biegel. 2000. Power Reduction through RTL Clock Gating. SNUG San Jose (2000) 1--11. F. Emnett and M. Biegel. 2000. Power Reduction through RTL Clock Gating. SNUG San Jose (2000) 1--11.
4. Full-Lock
5. https://www.synopsys.com/designware-ip/technical-bulletin/understanding-powerprofile.html. [n.d.]. Understanding Your Power Profile from RTL to Gate-level Implementation. https://www.synopsys.com/designware-ip/technical-bulletin/understanding-powerprofile.html. [n.d.]. Understanding Your Power Profile from RTL to Gate-level Implementation.