{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T00:49:35Z","timestamp":1725670175646},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642283642"},{"type":"electronic","value":"9783642283659"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-28365-9_23","type":"book-chapter","created":{"date-parts":[[2012,3,22]],"date-time":"2012-03-22T20:56:38Z","timestamp":1332449798000},"page":"276-289","source":"Crossref","is-referenced-by-count":3,"title":["Securely Sealing Multi-FPGA Systems"],"prefix":"10.1007","author":[{"given":"Tim","family":"G\u00fcneysu","sequence":"first","affiliation":[]},{"given":"Igor","family":"Markov","sequence":"additional","affiliation":[]},{"given":"Andr\u00e9","family":"Weimerskirch","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","unstructured":"China to make foreign firms reveal secret info. Yomiuri Shimbun (September 2008), \n                    \n                      http:\/\/www.yomiuri.co.jp\/dy\/business\/20080919TDY01306.htm"},{"key":"23_CR2","unstructured":"FBI Concerned About Implications of Counterfeit Cisco Gear. Slashdot (April 2008), \n                    \n                      http:\/\/hardware.slashdot.org\/article.pl?sid=08\/04\/22\/1317212"},{"issue":"5","key":"23_CR3","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MSPEC.2008.4505310","volume":"45","author":"S. Adee","year":"2008","unstructured":"Adee, S.: The Hunt For The Kill Switch. IEEE Spectrum\u00a045(5), 34\u201339 (2008)","journal-title":"IEEE Spectrum"},{"key":"23_CR4","unstructured":"Altera Corporation: FPGA Design Security Solution Using MAX II Devices. White Paper, ver. 1.0 (September 2004), \n                    \n                      http:\/\/www.altera.com\/literature\/wp\/wp_m2dsgn.pdf"},{"key":"23_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/978-3-540-71431-6_7","volume-title":"Reconfigurable Computing: Architectures, Tools and Applications","author":"S. Drimer","year":"2007","unstructured":"Drimer, S.: Authentication of FPGA Bitstreams: Why and How. In: Diniz, P.C., Marques, E., Bertels, K., Fernandes, M.M., Cardoso, J.M.P. (eds.) ARCS 2007. LNCS, vol.\u00a04419, pp. 73\u201384. Springer, Heidelberg (2007)"},{"key":"23_CR6","unstructured":"Drimer, S.: Volatile FPGA design security \u2013 a survey (v0.96) (April 2008), \n                    \n                      http:\/\/www.cl.cam.ac.uk\/~sd410\/papers\/fpga_security.pdf"},{"key":"23_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1661438.1661441","volume":"3","author":"S. Drimer","year":"2010","unstructured":"Drimer, S., G\u00fcneysu, T., Paar, C.: DSPs, BRAMs, and a pinch of logic: Extended recipes for AES on FPGAs. ACM Trans. Reconfigurable Technol. Syst.\u00a03, 1\u201327 (2010), \n                    \n                      http:\/\/doi.acm.org\/10.1145\/1661438.1661441","journal-title":"ACM Trans. Reconfigurable Technol. Syst."},{"key":"23_CR8","unstructured":"Gross, G.: US, Canadian agencies seize counterfeit Cisco gear. The Industry Standard (2008), \n                    \n                      http:\/\/slashdot.org\/article.pl?sid=08\/02\/29\/1642221"},{"key":"23_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-540-74735-2_5","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"J. Guajardo","year":"2007","unstructured":"Guajardo, J., Kumar, S.S., Schrijen, G.-J., Tuyls, P.: FPGA Intrinsic PUFs and their Use for IP Protection. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol.\u00a04727, pp. 63\u201380. Springer, Heidelberg (2007)"},{"key":"23_CR10","doi-asserted-by":"crossref","unstructured":"G\u00fcneysu, T., M\u00f6ller, B., Paar, C.: Dynamic Intellectual Property Protection for Reconfigurable Devices. In: ICFPT 2007, pp. 169\u2013176 (2007)","DOI":"10.1109\/FPT.2007.4439246"},{"key":"23_CR11","doi-asserted-by":"crossref","unstructured":"G\u00fcneysu, T.: Using Data Contention in Dual-ported Memories for Security Applications. Journal of Signal Processing Systems, 1\u201315 (December 30, 2010), doi:10.1007\/s11265-010-0560-z","DOI":"10.1007\/s11265-010-0560-z"},{"key":"23_CR12","unstructured":"Helion Technology: Tiny Hash Core Family for Xilinx FPGA. Data Sheet (2010), \n                    \n                      http:\/\/www.heliontech.com\/downloads\/tiny_hash_xilinx_datasheet.pdf"},{"key":"23_CR13","doi-asserted-by":"crossref","unstructured":"Kumar, S., Guajardo, J., Maes, R., Schrijen, G., Tuyls, P.: Extended abstract: The butterfly PUF protecting IP on every FPGA. In: IEEE International Workshop on Hardware-Oriented Security and Trust (HOST 2008), pp. 67\u201370 (2008)","DOI":"10.1109\/HST.2008.4559053"},{"key":"23_CR14","unstructured":"McEvoy, R.P., Crowe, F.M., Murphy, C.C., Marnane, W.P.: Optimisation of the SHA-2 family of hash functions on FPGAs. In: Emerging VLSI Technologies and Architectures (2006)"},{"issue":"5589","key":"23_CR15","doi-asserted-by":"publisher","first-page":"2026","DOI":"10.1126\/science.1074376","volume":"297","author":"R. Pappu","year":"2002","unstructured":"Pappu, R., Recht, B., Taylor, J., Gershenfeld, N.: Physical one-way functions. Science\u00a0297(5589), 2026\u20132030 (2002)","journal-title":"Science"},{"key":"23_CR16","unstructured":"Parelkar, M.M.: FPGA security \u2013 bitstream authentication. Tech. rep., George Mason University (2005), \n                    \n                      http:\/\/ece.gmu.edu\/courses\/Crypto_resources\/web_resources\/theses\/GMU_theses\/Parelkar\/Parelkar_Fall_2005.pdf"},{"key":"23_CR17","doi-asserted-by":"crossref","unstructured":"Roy, J.A., Koushanfar, F., Markov, I.L.: Extended abstract: Circuit CAD tools as a security threat. In: HOST, pp. 65\u201366 (2008)","DOI":"10.1109\/HST.2008.4559052"},{"key":"23_CR18","unstructured":"Seamann, G.: FPGA bitstreams and open designs (April 2000), \n                    \n                      http:\/\/web.archive.org\/web\/20050831135514\/http:\/\/www.opencollector.org\/news\/Bitstream\/"},{"key":"23_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/11894063_25","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2006","author":"E. Simpson","year":"2006","unstructured":"Simpson, E., Schaumont, P.: Offline Hardware\/Software Authentication for Reconfigurable Platforms. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol.\u00a04249, pp. 311\u2013323. Springer, Heidelberg (2006)"},{"key":"23_CR20","doi-asserted-by":"crossref","unstructured":"Trimberger, S.: Trusted design in FPGAs. In: Design Automation Conference (June 2007), \n                    \n                      http:\/\/videos.dac.com\/44th\/papers\/1_2.pdf","DOI":"10.1145\/1278480.1278483"},{"key":"23_CR21","doi-asserted-by":"crossref","unstructured":"Wollinger, T., Guajardo, J., Paar, C.: Security on FPGAs; state of the art implementation and attacks. In: ACM Trans. Embedded Comp. Sys., TECS (2004)","DOI":"10.1145\/1015047.1015052"}],"container-title":["Lecture Notes in Computer Science","Reconfigurable Computing: Architectures, Tools and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-28365-9_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T23:59:30Z","timestamp":1556495970000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-28365-9_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642283642","9783642283659"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-28365-9_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}