نتایج جستجو برای: Netlist Encryption

تعداد نتایج: 27942  

Journal: :isecure, the isc international journal of information security 0
sh. zamanzadeh computer science and engineering department, shahid beheshti university, tehran, iran a. jahanian computer science and engineering department, shahid beheshti university, tehran, iran

fab-less business model in semiconductor industry has led to serious concerns about trustworthy hardware. in untrusted foundries and manufacturing companies, submitted layout may be analyzed and reverse engineered to steal the information of a design or insert malicious trojans. understanding the netlist topology is the ultimate goal of the reverse engineering process. in this paper, we propose...

Fab-less business model in semiconductor industry has led to serious concerns about trustworthy hardware. In untrusted foundries and manufacturing companies, submitted layout may be analyzed and reverse engineered to steal the information of a design or insert malicious Trojans. Understanding the netlist topology is the ultimate goal of the reverse engineering process. In this paper, we propose...

2017
Sharareh Zamanzadeh Ali Jahanian A. Jahanian

Fab-less business model in semiconductor industry has led to serious concerns about trustworthy hardware. In untrusted foundries and manufacturing companies, submitted layout may be analyzed and reverse engineered to steal the information of a design or insert malicious Trojans. Understanding the netlist topology is the ultimate goal of the reverse engineering process. In this paper, we propose...

2010
Bahram Hakhamaneshi Behnam S. Arad

In this paper, a hardware implementation of the AES128 encryption algorithm is proposed. A unique feature of the proposed pipelined design is that the round keys, which are consumed during different iterations of encryption, are generated in parallel with the encryption process. This lowers the delay associated with each round of encryption and reduces the overall encryption delay of a plaintex...

Journal: :The Journal of Logic Programming 1990

2006
C. MANIFAVAS

Network data is, currently, often encrypted at a low level. In addition, as it is widely supported, the majority of future networks will use low-layer (IP level) encryption. Moreover, current trends imply that future networks are likely to be dominated by mobile terminals, thus, the power consumption and electromagnetic emissions aspects of encryption devices will be critical. This paper presen...

2000
Cherrice Traver

Phased logic is a synthesis/mapping methodology that allows a standard clocked netlist (combinational gates + DFFs) to be automatically mapped to a non-clocked netlist that uses special gates called phased logic gates. The new netlist has no clock networks and the only required global signal is a power-on reset. We demonstrate the viability of the phased logic approach via the synthesis and sim...

2004
Anthony Vannelli Scott W. Hadley

graph G and applying the eigenvector technique of Barnes 111 to partition the graph G into IC blocks of fixed module . size. An efficient generalization of the Fiduccia-Mattheyses node interchange heuristic is developed to further reduce the number of nets connecting k blocks [3]. This node interchange heuristic is tested on the one resulting netlist partition obtained by this new eigenvector a...

Journal: :IEEE Trans. on CAD of Integrated Circuits and Systems 1992
Scott W. Hadley Brian L. Mark Anthony Vannelli

A fast eigenvector technique for obtaining good initial node partitions of netlists for use in interchange heuristics is described. The method is based on approximating the netlist or hypergraph by a weighted graph, G, such that the sum of the cut edges in G tightly underestimates the number of cut nets in any netlist partition. An eigenvector technique of Barnes [2] is used to partition the gr...

Journal: :IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2020

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید