Hardware Trojan Horses in Cryptographic IP Cores | IEEE Conference Publication | IEEE Xplore