skip to main content
10.1145/288548.288606acmconferencesArticle/Chapter ViewAbstractPublication PagesiccadConference Proceedingsconference-collections
Article
Free Access

Signature hiding techniques for FPGA intellectual property protection

Authors Info & Claims
Published:01 November 1998Publication History
First page image

References

  1. 1.Anderson, R., and Kuhn, M. Tamper resistance- A cautionary note. Proceedings of the Second USENIX Workshop on Electronic Commerce. (1996), 1-1 I. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. 2.Charbon, E. Hierarchical watermarking in IC design. Proceedings of the Custom Integrated Circuits Conference '98. (1998).Google ScholarGoogle ScholarCross RefCross Ref
  3. 3.Cox, I.J. et al. Secure spread spectrum watermarking for images, audio and video. Proceedings of the Third International Conference on Image Processing. (1996), 243- 246.Google ScholarGoogle ScholarCross RefCross Ref
  4. 4.Diffie, W. and Hellman, M. New directions on cryptography. IEEE Transactions on Information Theory. IT-22, 6 (Nov. 1976), 644-654.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. 5.Hong, I., and Potkonjak, M. Behavioral synthesis techniques for intellectual property protection, unpublished manuscript. (1997).Google ScholarGoogle Scholar
  6. 6.Kahng, A.B. et al. Watermarking techniques for intellectual property protection. Proceedings of the Design Automation Conference '98. (1998). Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. 7.Leonard, J. and Mangione-Smith, W.H. A case study of partially evaluated hardware circuits: Key-Specific DES. FieM Programmable Logic. London, England (I 997). Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 8.Schneier, B. Applied Cryptography: Protocols, Algorithms, and Source Code in C. New York: John Wiley & Sons (1996). Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. 9.Swanson, M.D. et al. Transparent robust image watermarking, international Conference on Image Processing. (1996), 211-214.Google ScholarGoogle Scholar
  10. 10.Trimberger, S. Personal communication. Xilinx Corporation. (1997).Google ScholarGoogle Scholar
  11. 11.Villasenor, J. et al. Configurable computing solutions for automatic target recognition. Proceedings of lEEE Workshop on FPGAs for Custom Computing Machines. Ed. Arnold, J. and Pocek, K.L. Napa, CA (1996), 70-79.Google ScholarGoogle Scholar
  12. 12.Wolfgang, R.B. and Delp, E.J. A watermark for digital images. Applications of Toral Automorphisms. 3 (1996), 219-222.Google ScholarGoogle Scholar
  13. 13.XJlinx. The Programmable Logic Data Book. San Jose, CA (1996).Google ScholarGoogle Scholar

Index Terms

  1. Signature hiding techniques for FPGA intellectual property protection

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        ICCAD '98: Proceedings of the 1998 IEEE/ACM international conference on Computer-aided design
        November 1998
        704 pages
        ISBN:1581130082
        DOI:10.1145/288548

        Copyright © 1998 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 1 November 1998

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Acceptance Rates

        Overall Acceptance Rate457of1,762submissions,26%

        Upcoming Conference

        ICCAD '24
        IEEE/ACM International Conference on Computer-Aided Design
        October 27 - 31, 2024
        New York , NY , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader