Cryptographic core design security verification and vulnerability detection based on information flow analysis
JNWPU, 40 1 (2022) 76-83
Published online: 02 May 2022
DOI: 10.1051/jnwpu/20224010076