Cited By
View all- Alkabani YKoushanfar FFix L(2008)N-variant IC designProceedings of the 45th annual Design Automation Conference10.1145/1391469.1391606(546-551)Online publication date: 8-Jun-2008
As the capacity of FPGA's increases to millions of equivalent gates the use of Intellectual Property (IP) cores becomes increasingly important to control design complexity. FPGA's are becoming platforms for integrating a system solution from components ...
This paper presents an intellectual property (IP) protection authentication scheme for field programmable gate array (FPGA) with embedded watermark. The use of digital watermarks to provide ownership (watermarking) and recipient (fingerprinting) ...
Current IP encryption methods offered by FPGA vendors use an approach where the IP is decrypted during the CAD flow, and remains unencrypted in the bitstream. Given the ease of accessing modern bitstream-to-netlist tools, encrypted IP is vulnerable to ...
Association for Computing Machinery
New York, NY, United States
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in