Improvements to technology mapping for LUT-based FPGAs

A Mishchenko, S Chatterjee, R Brayton - … of the 2006 ACM/SIGDA 14th …, 2006 - dl.acm.org
The paper presents several improvements to state-of-the-art in FPGA technology mapping
exemplified by a recent advanced technology mapper DAOmap [Chen and Cong …

Optimality study of logic synthesis for LUT-based FPGAs

J Cong, K Minkovich - Proceedings of the 2006 ACM/SIGDA 14th …, 2006 - dl.acm.org
FPGA logic synthesis and technology mapping have been studied extensively over the past
15 years. However, progress within the last few years has slowed considerably (with some …

[图书][B] Practical problems in VLSI physical design automation

SK Lim - 2008 - books.google.com
Practical Problems in VLSI Physical Design Automation contains problems and solutions
related to various well-known algorithms used in VLSI physical design automation. Dr. Lim …

Bitstream modification attack on SNOW 3G

M Moraitis, E Dubrova - 2020 Design, Automation & Test in …, 2020 - ieeexplore.ieee.org
SNOW 3G is one of the core algorithms for confidentiality and integrity in several 3GPP
wireless communication standards, including the new Next Generation (NG) 5G. It is …

In pursuit of instant gratification for FPGA design

A Love, W Zha, P Athanas - 2013 23rd International Conference …, 2013 - ieeexplore.ieee.org
This paper describes an alternative FPGA design compilation flow to reduce the back-end
time required to implement a Xilinx FPGA design. Using a library of precompiled modules …

Beyond the arithmetic constraint: depth-optimal mapping of logic chains in LUT-based FPGAs

MT Frederick, AK Somani - Proceedings of the 16th international ACM …, 2008 - dl.acm.org
Look-up table based FPGAs have migrated from a niche technology for design prototyping
to a valuable end-product component and, in some cases, a replacement for general …

Attacking Trivium at the bitstream level

K Ngo, E Dubrova, M Moraitis - 2020 IEEE 38th International …, 2020 - ieeexplore.ieee.org
In this paper, we present a bitstream modification attack on the Trivium stream cipher, an
international standard under ISO/IEC 29192-3. By changing the content of three LUTs in the …

[PDF][PDF] An integrated technology mapping environment

R Brayton, S Chatterjee… - … Workshop on Logic …, 2005 - people.eecs.berkeley.edu
This paper describes a flexible and efficient environment for technology mapping featuring a
common set of algorithms for both standard cells and LUT-based FPGAs. The algorithms …

Bitstream modification of trivium

K Ngo, E Dubrova, M Moraitis - Cryptology ePrint Archive, 2020 - eprint.iacr.org
In this paper we present a bitstream modification attack on the Trivium cipher, an
international standard under ISO/IEC 29192-3. By changing the content of three LUTs in the …

Breaking ACORN at bitstream level

M Moraitis, E Dubrova, K Ngo - 2020 IFIP/IEEE 28th …, 2020 - ieeexplore.ieee.org
Assuring the security of the Internet of Things (IoT) is much more challenging than assuring
the security of centralized environments, like the cloud. A reason for this is that IoT devices …