نتایج جستجو برای: field programmable gate array

تعداد نتایج: 929590  

2009
J. Rajendran

Recently, there have been reports of trojans being inserted at hardware. We propose a trojan detection method which uses ring oscillators to detect trojans that are inserted at gate level. We designed a trojan that bypasses the cryptohardware module when activated. We also analyze other teams trojan detection methods and compare it with our design.

2014
Ali Asghar Husain Parvez

Embedded System Research Group Graduate School of Science and Engineering

Journal: :Microelectronics Journal 2013
Vincent Kerzerho Serge Bernard Florence Azaïs Mariane Comte Olivier Potin Chuan Shan G. Bontorin Michel Renovell

The histogram-based technique is commonly used for testing of Analog-to-Digital Converters (ADC). One of the parameters measured thanks to this technique is the Integral Non Linearity (INL). INL is also used as an initial data related to the ADC performances for the computation of a correction table in case of a LUT-based correction technique. In this context of embedded INL measurement and emb...

2001
Christoph Scholl

Bargaining with reading habit is no need. Reading is not kind of something sold that you can take or not. It is a thing that will change your life to life better. It is the thing that will give you many things around the world and this universe, in the real world and here after. As what will be given by this functional decomposition with applications to fpga synthesis, how can you bargain with ...

2010
Edward David Moreno Fabio Dacencio Pereira

There are several tools and techniques that can inhibit different and malicious attacks. However, the incorrect use and the lack of data exchange among these security applications can create vulnerability points. In this paper, we propose an Embedded System for Security Services Integration (SSI) and discuss aspects about its architecture and performance when it is implemented in FPGA.

2013
C. H. ANG Philip Leong André van Schaik Alistair McEwan

2003
Yongquan Fan

.......................................................................................................... i Résumé ........................................................................................................... ii Acknowledgments ........................................................................................ iii Table of

1999
Mathew Wojko

This paper studies pipelined multiplication techniques for implementation on FPGAs with emphasis on the utilisation of FPGA hardware resource. Performance of multiplier implementations are measured for commercially available FPGA architectures where two inherent issues are introduced and investigated. These being the imbalance of critical interconnect delay between general routing and static ca...

2005
Joshua Noseworthy Sarah Leeper

............................................................................................................................. 2

2007
Saar Drimer

Encryption of volatile FPGA bitstreams provides confidentiality to the design but does not ensure its authenticity. This paper motivates the need for adding authentication to the configuration process by providing application examples where this functionality is useful. An examination of possible solutions is followed by suggesting a practical one in consideration of the FPGA’s configuration en...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید