Cryptographic rights management of FPGA intellectual property cores
FPGA '02 Proceedings of the 2002 ACM/SIGDA tenth international symposium on Field-programmable gate arrays
FPL '99 Proceedings of the 9th International Workshop on Field-Programmable Logic and Applications
Guide to Elliptic Curve Cryptography
Guide to Elliptic Curve Cryptography
The Design Warrior's Guide to FPGAs
The Design Warrior's Guide to FPGAs
Breaking ciphers with COPACOBANA –a cost-optimized parallel code breaker
CHES'06 Proceedings of the 8th international conference on Cryptographic Hardware and Embedded Systems
Hi-index | 0.00 |
Modern FPGAs support the dynamic reconfiguration of their content but they offer no built in resource management. This paper describes how this security implication can be solved by using implicit resource descriptors for each FPGA-module and a Role-Based Access Control Model to describe the security policy. The proposed architecture enforces this security policy by using a single module loader that compares the requested resources with the granted privileges.