1.
Fyrbiak M, Wallat S, Déchelotte J, Albartus N, Böcker S, Tessier R, et al. On the Difficulty of FSM-based Hardware Obfuscation. TCHES [Internet]. 2018 Aug. 14 [cited 2024 Apr. 25];2018(3):293-330. Available from: https://tches.iacr.org/index.php/TCHES/article/view/7277