hardware obfuscation造句
例句與造句
- Hardware watermarking can be used in conjunction with hardware obfuscation.
- The technique of key-based, active hardware obfuscation is similar in principle to private-key cryptographic approaches for information protection, since the " key sequence " for the obfuscated design plays a similar role as the cryptographic key.
- Hardware obfuscation techniques can be classified into two main categories : ( a ) the " passive " techniques, which do not directly affect the functionality of the electronic system, and ( b ) the " active " techniques, which directly alter the functionality of the system.
- Often the active hardware obfuscation techniques are " key-based ", such that normal functionality of the obfuscated design can only be enabled by the successful application of a single pre-determined key or a sequence of secret keys at the input; otherwise the circuit operates in a mode, which exhibits incorrect functionality.
- It's difficult to find hardware obfuscation in a sentence. 用hardware obfuscation造句挺難的