Voir la notice de l'article provenant de la source Math-Net.Ru
@article{PDM_2014_2_a9, author = {D. I. Cheremisinov}, title = {Protecting intellectual property in {FPGA} {Xilinx} design}, journal = {Prikladna\^a diskretna\^a matematika}, pages = {110--118}, publisher = {mathdoc}, number = {2}, year = {2014}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/PDM_2014_2_a9/} }
D. I. Cheremisinov. Protecting intellectual property in FPGA Xilinx design. Prikladnaâ diskretnaâ matematika, no. 2 (2014), pp. 110-118. http://geodesic.mathdoc.fr/item/PDM_2014_2_a9/
[1] Wollinger T., Guarjardo J., and Paar C., “Security on FPGAs: State-of-the-Art implementations and attacks”, ACM Trans. Embedded Comput. Systems, 3:3 (2004), 534–574 | DOI
[2] Musker D. C., “Reverse engineering”, Protecting Exploiting Intellectual Property in Electronics, IBC Conferences, 10 June 1998 http://www.jenkins.eu/articles-general/reverse-engineering.asp
[3] Wollinger T., Parr C., “How secure are FPGAs in cryptographic applications”, LNCS, 2887, 2003, 91–100
[4] Trimberger S., “Trusted design in FPGAs”, Proc. 44th Annual Design Automation Conf. (DAC' 07), ACM, N.Y., 2007, 5–8 | DOI
[5] Note J.-B., Rannaud E., “From the bitstream to the netlist”, Proc. 16th Int. ACM/SIGDA Symp. on FPGA, ACM, N.Y., 2008, 264–264 | DOI
[6] Beckhoff C., Koch D., Torresen J., “The Xilinx Design Language (XDL): Tutorial and use cases”, 6th Int. Workshop ReCoSoC' 11, Montpellier, France, 2011, 1–8
[7] V. V. Yaschenko (red.), Vvedenie v kriptografiyu, Piter, SPb., 2001, 288 pp.
[8] Cifuentes C., Gough K. J., “Decompilation of binary programs”, Software – Practice Experience, 25:7 (1995), 811–829 | DOI
[9] Beckhoff C., Koch D., Torresen J., “Go ahead: a partial reconfiguration framework”, 20th Annual IEEE Int. Symp. on Field-Programmable Custom Comp. Machines (April 29 – May 1, 2012, Toronto, Canada), 27–44
[10] Partial Reconfiguration User Guide UG702 (v13.1), Xilinx Inc., March 1, 2011, 124 pp.
[11] Majzoobi M., Koushanfar F., Potkonjak M., “FPGA-oriented security”, Introduction to Hardware Security and Trust, eds. M. Tehranipour, M. Wang, Springer, 2011, 195–231