@ARTICLE{952740, author={Kahng, A.B. and Lach, J. and Mangione-Smith, W.H. and Mantik, S. and Markov, I.L. and Potkonjak, M. and Tucker, P. and Huijuan Wang and Wolfe, G.}, journal={Computer-Aided Design of Integrated Circuits and Systems, IEEE Transactions on}, title={Constraint-based watermarking techniques for design IP protection}, year={2001}, volume={20}, number={10}, pages={1236-1252}, keywords={VLSI;circuit layout CAD;copy protection;cryptography;hardware description languages;industrial property;integrated circuit design;network routing;timing;VLSI;authorship;black-box design tool;central processing unit time;concrete protocols;constraint-based watermarking techniques;cryptography;design IP protection;design methodology;design metrics;device-level netlist;hardware description language program;layout area;placement;preprocessing approach;real-world industrial designs;routing congestion;timing;unauthorized reuse;vias;wirelength;Design methodology;Digital systems;Hardware design languages;Humans;Inspection;Intellectual property;Product design;Protection;Very large scale integration;Watermarking}, doi={10.1109/43.952740}, ISSN={0278-0070},}