Table 2 Truth table for XOR encrypted circuit.
From: Efficient design and analysis of secure CMOS logic through logic encryption
Inputs | Key | Output | Key | Output | |
|---|---|---|---|---|---|
A | B | K | Out | K | Out |
0 | 0 | 0 | 0 | 1 | 1 |
0 | 1 | 0 | 0 | 1 | 1 |
1 | 0 | 0 | 0 | 1 | 1 |
1 | 1 | 0 | 1 | 1 | 0 |
From: Efficient design and analysis of secure CMOS logic through logic encryption
Inputs | Key | Output | Key | Output | |
|---|---|---|---|---|---|
A | B | K | Out | K | Out |
0 | 0 | 0 | 0 | 1 | 1 |
0 | 1 | 0 | 0 | 1 | 1 |
1 | 0 | 0 | 0 | 1 | 1 |
1 | 1 | 0 | 1 | 1 | 0 |