With encryption cores, a design team must be able to prove beyond doubt that no virus or Trojan code is incorporated in the core.
With encryption cores, a design team must be able to prove beyond doubt that no virus or Trojan code is incorporated in the core.