2019
DOI: 10.1177/1687814019836838
|View full text |Cite
|
Sign up to set email alerts
|

Intellectual property protection for FPGA designs using the public key cryptography

Abstract: For the copyright protection in intellectual property reuse technology, we must ensure that when an intellectual property watermark verifier leaks the secret key of an intellectual property watermark system, a malicious attacker could not guess the key to facilitate successful attacks on the watermarks. Therefore, this work proposes a robust intellectual property watermarking algorithm based on elliptic-curve cryptography. The physical layout of intellectual property design is abstracted into a graph with tree… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
2
1
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 23 publications
0
3
0
Order By: Relevance
“…(ii) The combination of cryptography with digital watermarking techniques is another way to enhance IP protection. For instance, Huang et al propose to use public key cryptography to encrypt the watermark's position, rendering it robust against unauthorized modifications or attacks by malicious individuals [80].…”
Section: A Ip Protection and Regulation Methods In Aigcmentioning
confidence: 99%
“…(ii) The combination of cryptography with digital watermarking techniques is another way to enhance IP protection. For instance, Huang et al propose to use public key cryptography to encrypt the watermark's position, rendering it robust against unauthorized modifications or attacks by malicious individuals [80].…”
Section: A Ip Protection and Regulation Methods In Aigcmentioning
confidence: 99%
“…A prime outline of an open cloud is Microsoft Purplish blue. [20], [21], [34], [47] 2) Private cloud: Computing resources utilized only by users from a single company or organization make up a private cloud. It may be physically situated at the on-site data center of your company, or it may be facilitated by a distinctive benefit supplier.…”
Section: Reviewmentioning
confidence: 99%
“…Use of Technology Governments are leading the list of customers of this technology, which amounts to about $ 4 billion, namely government agencies that deal with collective identification systems such as prisons, airports, vehicle licensing authorities, and, of course, police. This technique is used in Mexico to prevent fraud during voting [31].…”
Section: Introductionmentioning
confidence: 99%