Proceedings of the 2nd International Symposium on Computer, Communication, Control and Automation (ISCCCA 2013)

Security Analysis of Cryptographical Module for FPGA

Authors
Haitao Sun, Jie Liu, Deqing Xue
Corresponding Author
Haitao Sun
Available Online February 2013.
DOI
10.2991/isccca.2013.129How to use a DOI?
Keywords
Hardware Trojan, FPGA life cycle, security threat model, FPGA.
Abstract

FPGA has been used abroad all fields about space, military, auto. It is the best choose of cipher protocol and arithmetic achievement. Its security has been concerned. In this article the authors design a Hardware Trojan of transmitting key information towards FPGA. It is important to realize the implement mechanism and raise the attention to IC security.

Copyright
© 2013, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the 2nd International Symposium on Computer, Communication, Control and Automation (ISCCCA 2013)
Series
Advances in Intelligent Systems Research
Publication Date
February 2013
ISBN
978-90-78677-63-5
ISSN
1951-6851
DOI
10.2991/isccca.2013.129How to use a DOI?
Copyright
© 2013, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Haitao Sun
AU  - Jie Liu
AU  - Deqing Xue
PY  - 2013/02
DA  - 2013/02
TI  - Security Analysis of Cryptographical Module for FPGA
BT  - Proceedings of the 2nd International Symposium on Computer, Communication, Control and Automation (ISCCCA 2013)
PB  - Atlantis Press
SP  - 518
EP  - 520
SN  - 1951-6851
UR  - https://doi.org/10.2991/isccca.2013.129
DO  - 10.2991/isccca.2013.129
ID  - Sun2013/02
ER  -