메뉴 건너뛰기




Volumn , Issue , 2007, Pages 169-176

Dynamic intellectual property protection for reconfigurable devices

Author keywords

Embedded security; FPGA; IP protection; Secure configuration

Indexed keywords

CRYPTOGRAPHY; ELECTRIC BREAKDOWN; ELECTRIC POWER SYSTEM PROTECTION; FLASH MEMORY; INTELLECTUAL PROPERTY; INTERNET PROTOCOLS; PUBLIC KEY CRYPTOGRAPHY; TECHNOLOGY;

EID: 50149103541     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/FPT.2007.4439246     Document Type: Conference Paper
Times cited : (40)

References (25)
  • 4
    • 50149095370 scopus 로고    scopus 로고
    • How to Protect Intellectual Property in FPGA Devices Part II
    • T. Barraza. How to Protect Intellectual Property in FPGA Devices Part II. Design and Reuse Online: Industry Articles, 2005. http://www.us.design- reuse.com/articles/article11240.html
    • (2005) Design and Reuse Online: Industry Articles
    • Barraza, T.1
  • 5
    • 50149085052 scopus 로고    scopus 로고
    • M. Bellare and C. Namprempre. Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
    • M. Bellare and C. Namprempre. Authenticated encryption: Relations among notions and analysis of the generic composition paradigm.
  • 6
    • 50149092596 scopus 로고    scopus 로고
    • Berkeley University
    • Berkeley University. Bee2 project. http://bee2.eecs.berkeley.edu
    • Bee2 project
  • 10
    • 50149100116 scopus 로고    scopus 로고
    • J. Fry and M. Langhammer. RSA & Public Key Cryptography in FPGAs. Technical report, Altera Corp., 2005.
    • J. Fry and M. Langhammer. RSA & Public Key Cryptography in FPGAs. Technical report, Altera Corp., 2005.
  • 11
    • 50149111516 scopus 로고    scopus 로고
    • T. Kean. Secure configuration of field programmable gate arrays. In In proceeding of 11th International Conference on Field-Programmable Logic and Applications, FPL2001, Belfast, United Kingdom, 2001.
    • T. Kean. Secure configuration of field programmable gate arrays. In In proceeding of 11th International Conference on Field-Programmable Logic and Applications, FPL2001, Belfast, United Kingdom, 2001.
  • 13
    • 47349110012 scopus 로고    scopus 로고
    • Cryptographic Rights Management of FPGA Intellectual Property Cores
    • Monterey, CA
    • T. Kean. Cryptographic Rights Management of FPGA Intellectual Property Cores. In Proceedings ACM Conference on FPGAs, Monterey, CA, 2002.
    • (2002) Proceedings ACM Conference on FPGAs
    • Kean, T.1
  • 14
    • 50149102113 scopus 로고    scopus 로고
    • Ç. K. Koç. RSA hardware implementation. Technical report TR801, RSA Data Security, Inc., Aug. 1995.
    • Ç. K. Koç. RSA hardware implementation. Technical report TR801, RSA Data Security, Inc., Aug. 1995.
  • 15
    • 2442532948 scopus 로고    scopus 로고
    • An embedded true random number generator for FPGAs
    • R. Tessier and H. Schmit, ed, ACM
    • P. Kohlbrenner and K. Gaj. An embedded true random number generator for FPGAs. In R. Tessier and H. Schmit, ed., FPGA, pp. 71-78. ACM, 2004.
    • (2004) FPGA , pp. 71-78
    • Kohlbrenner, P.1    Gaj, K.2
  • 19
    • 0012983374 scopus 로고    scopus 로고
    • Recommendation for block cipher modes of operation - the CMAC mode for authentication
    • National Institute of Standards and Technology NIST
    • National Institute of Standards and Technology (NIST). Recommendation for block cipher modes of operation - the CMAC mode for authentication. NIST Special Publication SP 800-38B, 2005.
    • (2005) NIST Special Publication , vol.SP 800-38B
  • 20
    • 47349083762 scopus 로고    scopus 로고
    • Recommendation for pair-wise key establishment schemes using discrete logarithm cryptography
    • National Institute of Standards and Technology NIST
    • National Institute of Standards and Technology (NIST). Recommendation for pair-wise key establishment schemes using discrete logarithm cryptography. NIST Special Publication SP 800-56A, 2006.
    • (2006) NIST Special Publication , vol.SP 800-56A
  • 21
    • 35248847436 scopus 로고    scopus 로고
    • Power-analysis attacks on an FPGA first experimental results
    • CHES
    • S. B. Örs, E. Oswald, and B. Preneel. Power-analysis attacks on an FPGA first experimental results. In CHES 2003, LNCS vol. 2779, pp. 35-50, 2003.
    • (2003) LNCS , vol.2779 , pp. 35-50
    • Örs, S.B.1    Oswald, E.2    Preneel, B.3
  • 22
    • 33750702480 scopus 로고    scopus 로고
    • Offline hardware/software authentication for reconfigurable platforms
    • CHES 2006
    • E. Simpson and P. Schaumont. Offline hardware/software authentication for reconfigurable platforms. In CHES 2006, LNCS vol. 4249, pp. 311-323, 2006.
    • (2006) LNCS , vol.4249 , pp. 311-323
    • Simpson, E.1    Schaumont, P.2
  • 23
    • 85008060937 scopus 로고    scopus 로고
    • B. Sunar, W. J. Martin, and D. R. Stinson. A provably secure true random number generator with built-in tolerance to active attacks. IEEE Tr. Computers, 56.1:109-119, January 2007.
    • B. Sunar, W. J. Martin, and D. R. Stinson. A provably secure true random number generator with built-in tolerance to active attacks. IEEE Tr. Computers, 56.1:109-119, January 2007.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.