Surreptitious Use Prevention Mechanisms for the System LSI Core
Protection countermeasures for the intellectual property (IP) of adopted cores are an important issue in ultra large-scale integrated circuits called system LSI. In this paper, we propose embedding cryptosystems such as a public key system or hash function system with cores to be protected. Which sy...
Gespeichert in:
Veröffentlicht in: | Denki Gakkai ronbunshi. C, Erekutoronikusu, joho kogaku, shisutemu Information and Systems, 2004, Vol.124(5), pp.1156-1164 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Protection countermeasures for the intellectual property (IP) of adopted cores are an important issue in ultra large-scale integrated circuits called system LSI. In this paper, we propose embedding cryptosystems such as a public key system or hash function system with cores to be protected. Which system should be adopted is considered from the viewpoints of importance of the core, efficiency and authentication structure. The soundness of each method is confirmed by trial productions by gate array process, implementation by FPGA, and by computer simulation. |
---|---|
ISSN: | 0385-4221 1348-8155 |
DOI: | 10.1541/ieejeiss.124.1156 |