Surreptitious Use Prevention Mechanisms for the System LSI Core

Protection countermeasures for the intellectual property (IP) of adopted cores are an important issue in ultra large-scale integrated circuits called system LSI. In this paper, we propose embedding cryptosystems such as a public key system or hash function system with cores to be protected. Which sy...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Denki Gakkai ronbunshi. C, Erekutoronikusu, joho kogaku, shisutemu Information and Systems, 2004, Vol.124(5), pp.1156-1164
Hauptverfasser: Nakamura, Tsugio, Sato, Tomotake, Fuyutsume, Narito, Kasahara, Hiroshi, Tanaka, Teruo
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Protection countermeasures for the intellectual property (IP) of adopted cores are an important issue in ultra large-scale integrated circuits called system LSI. In this paper, we propose embedding cryptosystems such as a public key system or hash function system with cores to be protected. Which system should be adopted is considered from the viewpoints of importance of the core, efficiency and authentication structure. The soundness of each method is confirmed by trial productions by gate array process, implementation by FPGA, and by computer simulation.
ISSN:0385-4221
1348-8155
DOI:10.1541/ieejeiss.124.1156