1.
On the Difficulty of FSM-based Hardware Obfuscation. TCHES [Internet]. 2018 Aug. 14 [cited 2024 Nov. 23];2018(3):293-330. Available from: https://tches.iacr.org/index.php/TCHES/article/view/7277