Security Analysis of Cryptographical Module for FPGA
Authors
Haitao Sun, Jie Liu, Deqing Xue
Corresponding Author
Haitao Sun
Available Online February 2013.
- DOI
- 10.2991/isccca.2013.129How to use a DOI?
- Keywords
- Hardware Trojan, FPGA life cycle, security threat model, FPGA.
- Abstract
FPGA has been used abroad all fields about space, military, auto. It is the best choose of cipher protocol and arithmetic achievement. Its security has been concerned. In this article the authors design a Hardware Trojan of transmitting key information towards FPGA. It is important to realize the implement mechanism and raise the attention to IC security.
- Copyright
- © 2013, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Haitao Sun AU - Jie Liu AU - Deqing Xue PY - 2013/02 DA - 2013/02 TI - Security Analysis of Cryptographical Module for FPGA BT - Proceedings of the 2nd International Symposium on Computer, Communication, Control and Automation (ISCCCA 2013) PB - Atlantis Press SP - 518 EP - 520 SN - 1951-6851 UR - https://doi.org/10.2991/isccca.2013.129 DO - 10.2991/isccca.2013.129 ID - Sun2013/02 ER -