Table 1 Truth table of encrypted 2:1 MUX.
From: Efficient design and analysis of secure CMOS logic through logic encryption
Input | Input | Output |
|---|---|---|
Key | IN | OUT2 |
0 | 0 | 0 |
0 | 1 | 1 |
1 | 0 | 1 |
1 | 1 | 0 |
From: Efficient design and analysis of secure CMOS logic through logic encryption
Input | Input | Output |
|---|---|---|
Key | IN | OUT2 |
0 | 0 | 0 |
0 | 1 | 1 |
1 | 0 | 1 |
1 | 1 | 0 |