CN113420304A - Encryption and decryption method, device and computer readable medium for SPICE netlist and model - Google Patents

Encryption and decryption method, device and computer readable medium for SPICE netlist and model Download PDF

Info

Publication number
CN113420304A
CN113420304A CN202110556684.3A CN202110556684A CN113420304A CN 113420304 A CN113420304 A CN 113420304A CN 202110556684 A CN202110556684 A CN 202110556684A CN 113420304 A CN113420304 A CN 113420304A
Authority
CN
China
Prior art keywords
circuit
spice
encrypted
encryption
spice netlist
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110556684.3A
Other languages
Chinese (zh)
Inventor
徐翊民
孙家鑫
邓俊勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Julin Shanghai Microelectronics Co ltd
Original Assignee
Julin Shanghai Microelectronics Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Julin Shanghai Microelectronics Co ltd filed Critical Julin Shanghai Microelectronics Co ltd
Priority to CN202110556684.3A priority Critical patent/CN113420304A/en
Publication of CN113420304A publication Critical patent/CN113420304A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F30/00Computer-aided design [CAD]
    • G06F30/30Circuit design
    • G06F30/36Circuit design at the analogue level
    • G06F30/367Design verification, e.g. using simulation, simulation program with integrated circuit emphasis [SPICE], direct methods or relaxation methods

Abstract

A SPICE netlist and model encryption and decryption method, device and computer readable medium, said method comprises providing circuit diagram view and SPICE netlist that convert into circuit symbol view; representing all circuit models adopted by the circuit diagram view and the configuration information of the circuit models by the SPICE netlist in a code language; receiving and responding to the encryption request, and randomly generating a key pair; encrypting the SPICE netlist file according to the encryption key in the key pair to form an encrypted SPICE netlist file, wherein each character in the encrypted netlist file is changed into a character with different length and less than 2MA decimal number; receiving and calling a circuit symbol view and an SPICE encrypted netlist file; and decrypting the encrypted SPICE netlist file according to a decryption key in the key pair, and realizing the simulation of the circuit diagram view on the basis of the decrypted SPICE netlist file. Therefore, the invention not only can ensure that the created integrated circuit diagram can be simulated normally, but also can ensure that the created integrated circuit diagram can be simulated normallyDuring the use process, all the file contents are reliably protected.

Description

Encryption and decryption method, device and computer readable medium for SPICE netlist and model
Technical Field
The present invention relates to the field of Electronic Design Automation (EDA) software technology, and more particularly, to Simulation of device models, and more particularly, to an encryption/decryption method, device, and computer readable medium for Simulation program with integrated circuit (SPICE) SPICE netlist and model.
Background
With the use of the EDA tool, an electronic designer can design an electronic system from concepts, algorithms, protocols, and the like, a large amount of work can be done by a computer, and the whole process from circuit design, performance analysis to design of an IC layout or a PCB layout of an electronic product can be automatically processed and completed on the computer.
The designer of the circuit system needs to perform detailed analysis on the voltage-current relationship of partial circuits in the system, and at the moment, transistor-level Simulation (SPICE) needs to be performed, circuit models used in the simulation algorithm are all the most basic elements and single tubes, and the I/V relationship of each node is calculated according to the time relationship during simulation. The components in the circuit being analyzed may include resistors, capacitors, inductors, mutual inductors, independent voltage sources, independent current sources, various linearly controlled sources, transmission lines, and active semiconductor devices.
SPICE is a powerful general analog circuit simulator, which realizes the functions of circuit description, excitation addition, output control and the like through a circuit Netlist (Netlist). The simulation program is mainly used in the circuit analysis program of the integrated circuit, the circuit network table format of SPICE becomes the standard of the description of the common analog circuit and transistor level circuit, and the user only needs to select the model level and give out proper parameters to build a proper semiconductor device model in SPICE. Currently, most Integrated circuit manufacturers (IDM) are independent Device manufacturers, and almost every IDM has its own dead-end in process and Device, so that the number of Device models for simulation varies, and the larger the number of models, the more customers are attracted.
In order to prove that the developed device model is more accurate and excellent, the enterprises often need to provide parameter configurations of various models for a merchant to perform SPICE simulation so as to confirm the performance of the device model. If the research and development enterprise were open without encryption of these model parameters, the research and development enterprise would receive immeasurable losses on its own. Thus, various encryption and decryption measures have arisen in response to the need to develop commercial confidentiality protection, and more commonly used encryption measures may include setting a software login password and encrypting specific file data.
However, the conventional encryption measures described above cause inconvenience to users, specifically:
firstly, a password login mode is set, a user needs to remember the password firmly, and the existing password cracking software is more and the password is easy to overcome;
secondly, before data transmission, a sender and a receiver need to agree a secret key, and the specific file data is encrypted, so that the possibility of being cracked is high and the safety is low under the condition that the secret key is not leaked.
Disclosure of Invention
The invention aims to provide an encryption and decryption method based on a SPICE netlist and a model, which is a reliable method for protecting a core integrated circuit diagram design.
In order to achieve the purpose, the technical scheme of the invention is as follows:
an encryption and decryption method based on SPICE netlist and model, which comprises an encryption step S1 and a decryption step S2; the encryption step S1 includes:
step S11: providing a schematic view and a SPICE netlist corresponding to the schematic view; and converting the circuit diagram view into a circuit symbol view;
step S12: representing all circuit models adopted by the circuit diagram view and configuration information of the circuit models by the SPICE netlist in a code language; the configuration information of the circuit model comprises the specification and the number of the circuit model, the connection relation of each circuit model and the information of each port; the characters of the code language are stored in ASCII code form;
step S13: receiving and responding to an encryption request of a research and development enterprise user, and randomly generating a key pair;
step S14: encrypting the SPICE netlist file according to an encryption key in the key pair to form an encrypted SPICE netlist file; wherein each character in the encrypted netlist file becomes a different length less than 2MA decimal number;
the decryption step S2 includes:
step S21: receiving and calling the circuit symbol view and the SPICE encrypted netlist file by using an enterprise;
step S22: and decrypting the encrypted SPICE netlist file according to a decryption key in the key pair, and realizing the simulation of the circuit diagram view on the basis of the decrypted SPICE netlist file.
Further, the randomly generating the key pair in step S13 includes the following steps:
first, a random prime number generation algorithm is used to generate two unequal prime numbers, and the two prime numbers are multiplied to obtain a length of 2MA large number n in decimal places;
then, calculating an Euler function related to the large number n, and solving an integer & n;
then, randomly selecting an integer e, so that 1< e < & n, and the integer e and the integer & n are prime;
finally, the modulo element d of the integer e for & n is calculated. The integer n and the integer e are used as one key pair to be secondarily encrypted and then written into an encrypted file, and the integer n and the integer d are used as the other key pair to be written into a decryption module, so that the generation of a random key is completed.
Further, said 2MIs 1024.
In order to achieve the above object, another technical solution of the present invention is as follows:
a computer-readable medium for executing the program of the encryption and decryption method based on the SPICE netlist and the model, which is executed by being installed in a computer that executes the following program:
receiving a schematic view and a SPICE netlist corresponding to the schematic view; and converting the circuit diagram view into a circuit symbol view;
representing all circuit models adopted by the circuit diagram view and configuration information of the circuit models by the SPICE netlist file in a code language; the configuration information of the circuit model comprises the specification and the number of the circuit model, the connection relation of each circuit model and the information of each port; the characters of the code language are in ASCII code form;
receiving and responding to an encryption request of a research and development enterprise user, and randomly generating a key pair;
encrypting the SPICE netlist file according to an encryption key in the key pair to form an encrypted SPICE netlist file; wherein each character in the encrypted netlist file becomes a different length less than 2MA decimal number;
responding to an instruction of a user enterprise calling the circuit symbol view and the encrypted netlist file;
and encrypting the encrypted SPICE netlist file according to a decryption key in the key pair, and realizing the simulation of the circuit diagram view on the basis of the decrypted SPICE netlist file.
In order to achieve the above object, the present invention further comprises:
an apparatus for using the encryption and decryption method based on the SPICE netlist and the model comprises:
the first input interface module is used for receiving a circuit diagram view provided by a research and development enterprise and a SPICE netlist corresponding to the circuit diagram view; converting the circuit diagram view into a circuit symbol view, and representing all circuit models adopted by the circuit diagram view and configuration information of the circuit models by the SPICE netlist in a code language;
the key pair generation module is used for responding to an encryption request of a research and development enterprise user and randomly generating a key pair;
the encryption module encrypts the file of the SPICE netlist according to the encryption key in the key pair to form an encryption keyA secret SPICE netlist file; wherein each character in the encrypted netlist file becomes a different length less than 2MA decimal number;
the second input interface module is used for receiving and calling the circuit symbol view and the encrypted netlist file by an enterprise;
the decryption module encrypts the encrypted SPICE netlist file according to a decryption key in the key pair, and decrypts the encrypted netlist file;
a simulation module for realizing simulation of the circuit diagram view based on the decrypted SPICE netlist file
According to the technical scheme, in order to avoid the fact that a merchant acquires specific designs in a netlist and a netlist model, the encryption and decryption method of the SPICE netlist and the SPICE model provided by the invention creates symbolic views of all netlists and models which need to be sent to a user for integrated circuit design, so that a real circuit diagram view cannot be directly displayed on the user side, and the purpose of hiding the real circuit diagram view is achieved; the invention encrypts the simulator netlist file to obtain the encrypted netlist file so that a user can call the encrypted netlist file to decrypt the encrypted netlist file when the user simulates the integrated circuit diagram, and the simulation of the integrated circuit diagram is realized based on the decrypted netlist file.
That is to say, in the technical solution of the present invention, the real circuit diagram view is not directly provided to the user, and the encrypted netlist file encrypted by the emulator encryption program is only available inside the corresponding emulator, so that the present invention not only can ensure that the created integrated circuit diagram can be simulated normally, but also all the file contents are protected during the use process.
Drawings
FIG. 1 is a block diagram of a preferred embodiment of the encryption/decryption apparatus based on SPICE netlist and model according to the present invention
FIG. 2 is a flow chart illustrating a preferred embodiment of the encryption and decryption method based on SPICE netlist and model according to the present invention
Detailed Description
The following describes embodiments of the present invention in further detail with reference to the accompanying drawings.
It should be noted that since SPICE appeared, there are many versions of SPICE2, SPICE3, etc., and more common SPICE simulation software includes Hspice, Pspice, spectrum, Tspice, SmartSpice, IsSpice, and TJSPICE developed by this company, and the core algorithms of SPICE are the same, but the encryption modes are different, and are not described herein again.
In the following embodiments, the following embodiments are exemplified by TJSPICE developed by the present company.
Referring to fig. 1, fig. 1 is a block diagram of a preferred embodiment of an encryption/decryption apparatus based on SPICE netlist and model according to the present invention. As shown in the figure, the encryption and decryption device based on the SPICE netlist and the model comprises a first input interface module, a key pair generation module, an encryption module, a second input interface module, a decryption module and a simulation module.
In an embodiment of the invention, a first input interface module is used for receiving a circuit diagram view provided by a research and development enterprise and a SPICE netlist corresponding to the circuit diagram view (an integrated circuit diagram); and converting the circuit diagram view into a circuit symbol view, and representing all circuit models adopted by the circuit diagram view and configuration information of the circuit models by the SPICE netlist in a code language.
In order to avoid the actual design circuit and parameters of the SPICE netlist and the circuit diagram view model obtained by the user before purchase, the research and development enterprise firstly needs to create a symbolic view for the provided circuit diagram view to directly display the symbolic view on the user side instead of the circuit diagram view (i.e. the circuit diagram view is not directly provided for the user), so as to achieve the purpose of hiding the original circuit diagram view.
For example, in the embodiment of the present invention, the configuration information of the circuit model includes the specification model and the number of the circuit model, the connection relationship of each circuit model, and information of each port; the characters of the code language are stored in ASCII code form.
Referring to table 1, table 1 shows a TJSPICE netlist file of an inverter:
Figure BDA0003077511190000061
wherein,. subbckt observer notes: inverter is the name of the sub-circuit, in is the input port of the sub-circuit, out is the output port of the sub-circuit, VDD is the name of the port, GND is ground, p _ ckt and n _ ckt are the names of the two sub-circuits, respectively, W, L indicates the width and length, respectively.
In addition, in order to ensure that the created integrated circuit diagram can be simulated, the SPICE netlist file of the simulator is encrypted to obtain the encrypted SPICE netlist file, so that when a user simulates the integrated circuit diagram, the encrypted SPICE netlist file is called to be decrypted, and the simulation of the integrated circuit diagram is realized based on the decrypted SPICE netlist file.
Before an encryption module in the TJPICE simulator is used, an encryption request of a research and development enterprise user needs to be received, namely a response encryption request is received through a first input interface module, and a key pair generation module is instructed to randomly generate a key pair.
It should be noted that, in the embodiment of the present invention, the characters of the code language are stored in the computer in the form of ASCII code. The key pair generation module performs encryption calculation for each ASCII using a key pair based on the key pair written in the file, in which case each character in the file becomes approximately 2 in lengthMA decimal number. That is, the key pair generated by the key pair generation module needs to make each character in the encrypted netlist file into a number with a length different from and less than 2M decimal digits, preferably 2 decimal digitsMAt 1024, the key length of the key pair is 1024 decimal digits.
In a preferred embodiment of the present invention, randomly generating the key pair may include the steps of:
firstly, generating two unequal prime numbers by using a random prime number generation algorithm, and multiplying the two prime numbers to obtain a large number n with the length of 1024 decimal places;
then, calculating an Euler function related to the large number n, and solving an integer & n;
then, randomly selecting an integer e, so that 1< e < & n, and the integer e and the integer & n are prime;
and finally, calculating a modulo element d of the integer e for the integer & n, writing the integer n and the integer e into an encrypted file after performing secondary encryption on one key pair, and writing the integer n and the integer d into a decryption module as the other key pair to finish the generation of the random key.
When receiving an encryption instruction in the TJSPIE emulator, a command line:
“tjspice-e netlist.sp-o netlist.spe”
and calling an encryption module integrated in the TJSPIE to encrypt a simulator netlist file netlist. That is, the generated encrypted SPICE netlist files are only available inside the corresponding TJSPICE emulator as they are encrypted using the TJSPICE emulator encryption program. Therefore, the SPICE encrypted netlist file content is protected in the using process, and can be provided for a purchaser to perform subsequent simulation of performance safely, and accordingly, a subsequent simulation test of the performance of the purchaser can only be performed by using the second input interface module, the decryption module and the simulation module in the TJSPIE simulator.
Namely, the second input interface module uses an enterprise to receive and call the circuit symbol view and the encrypted netlist file; the decryption module encrypts the encrypted SPICE netlist file according to a decryption key in the key pair, and decrypts the encrypted netlist file; and the simulation module realizes the simulation of the circuit diagram view based on the decrypted SPICE netlist file.
After the encryption and decryption based on the SPICE netlist and the model are carried out, the encryption and decryption method based on the SPICE netlist and the model can be realized. Referring to FIG. 2, FIG. 2 is a flow chart illustrating a preferred embodiment of the encryption and decryption method based on SPICE netlist and model according to the present invention. As shown in fig. 2, the method includes an encryption step S1 and a decryption step S2;
the encryption step S1 includes:
step S11: providing a schematic view and a SPICE netlist corresponding to the schematic view; and converting the circuit diagram view into a circuit symbol view;
step S12: representing all circuit models adopted by the circuit diagram view and configuration information of the circuit models by the SPICE netlist in a code language; the configuration information of the circuit model comprises the specification and the number of the circuit model, the connection relation of each circuit model and the information of each port; the characters of the code language are stored in ASCII code form;
step S13: receiving and responding to an encryption request of a research and development enterprise user, and randomly generating a key pair;
step S14: encrypting the SPICE netlist file according to an encryption key in the key pair to form an encrypted SPICE netlist file; wherein each character in the encrypted netlist file becomes a different length less than 2MA decimal number;
the decryption step S2 includes:
step S21: receiving and calling the circuit symbol view and the SPICE encrypted netlist file by using an enterprise;
step S22: and decrypting the encrypted SPICE netlist file according to a decryption key in the key pair, and realizing the simulation of the circuit diagram view on the basis of the decrypted SPICE netlist file.
In an embodiment of the present invention, a computer readable medium may be further included, where the program for executing the encryption and decryption method based on SPICE netlist and model is installed in a computer to run, that is, the computer executes the following program:
receiving a schematic view and a SPICE netlist corresponding to the schematic view; and converting the circuit diagram view into a circuit symbol view;
representing all circuit models adopted by the circuit diagram view and configuration information of the circuit models by the SPICE netlist file in a code language; the configuration information of the circuit model comprises the specification and the number of the circuit model, the connection relation of each circuit model and the information of each port; the characters of the code language are in ASCII code form;
receiving and responding to an encryption request of a research and development enterprise user, and randomly generating a key pair;
encrypting the SPICE netlist file according to an encryption key in the key pair to form an encrypted SPICE netlist file; wherein each character in the encrypted netlist file becomes a different length less than 2MA decimal number;
responding to an instruction of a user enterprise calling the circuit symbol view and the encrypted netlist file;
and encrypting the encrypted SPICE netlist file according to a decryption key in the key pair, and realizing the simulation of the circuit diagram view on the basis of the decrypted SPICE netlist file.
In summary, the technical solution of the present invention may not provide the circuit diagram directly to the user, and the provided encrypted netlist files are encrypted by using the emulator encryption program, and these encrypted netlist files are only available inside the corresponding emulators, i.e. the file content is protected during the use process. Therefore, the invention provides a method for reliably protecting the design of a core integrated circuit diagram and also provides a method for encrypting and decrypting the netlist and the model based on SPICE.
The above description is only for the preferred embodiment of the present invention, and the embodiment is not intended to limit the scope of the present invention, so that all the equivalent structural changes made by using the contents of the description and the drawings of the present invention should be included in the scope of the present invention.

Claims (5)

1. The encryption and decryption method based on the SPICE netlist and the model is characterized by comprising an encryption step S1 and a decryption step S2;
the encryption step S1 includes:
step S11: providing a schematic view and a SPICE netlist corresponding to the schematic view; and converting the circuit diagram view into a circuit symbol view;
step S12: representing all circuit models adopted by the circuit diagram view and configuration information of the circuit models by the SPICE netlist in a code language; the configuration information of the circuit model comprises the specification and the number of the circuit model, the connection relation of each circuit model and the information of each port; the characters of the code language are stored in ASCII code form;
step S13: receiving and responding to an encryption request of a research and development enterprise user, and randomly generating a key pair;
step S14: encrypting the SPICE netlist file according to an encryption key in the key pair to form an encrypted SPICE netlist file; wherein each character in the encrypted netlist file becomes a different length less than 2MA decimal number;
the decryption step S2 includes:
step S21: receiving and calling the circuit symbol view and the SPICE encrypted netlist file by using an enterprise;
step S22: and decrypting the encrypted SPICE netlist file according to a decryption key in the key pair, and realizing the simulation of the circuit diagram view on the basis of the decrypted SPICE netlist file.
2. The SPICE netlist and model based encryption and decryption method of claim 1, wherein the randomly generated key pair in step S13 comprises the following steps:
first, a random prime number generation algorithm is used to generate two unequal prime numbers, and the two prime numbers are multiplied to obtain a length of 2MA large number n in decimal places;
then, calculating an Euler function related to the large number n, and solving an integer & n;
then, randomly selecting an integer e, so that 1< e < & n, and the integer e and the integer & n are prime;
finally, the modulo element d of the integer e for & n is calculated. The integer n and the integer e are used as one key pair to be secondarily encrypted and then written into an encrypted file, and the integer n and the integer d are used as the other key pair to be written into a decryption module, so that the generation of a random key is completed.
3. The SPICE netlist and model based encryption and decryption method of claim 1 or 2, wherein said 2MIs 1024.
4. A computer-readable medium for executing a program for the SPICE netlist and model-based encryption/decryption method according to any one of claims 1 to 3, by being installed in a computer to run, characterized in that the computer executes the following program:
receiving a schematic view and a SPICE netlist corresponding to the schematic view; and converting the circuit diagram view into a circuit symbol view;
representing all circuit models adopted by the circuit diagram view and configuration information of the circuit models by the SPICE netlist file in a code language; the configuration information of the circuit model comprises the specification and the number of the circuit model, the connection relation of each circuit model and the information of each port; the characters of the code language are in ASCII code form;
receiving and responding to an encryption request of a research and development enterprise user, and randomly generating a key pair;
encrypting the SPICE netlist file according to an encryption key in the key pair to form an encrypted SPICE netlist file; wherein each character in the encrypted netlist file becomes a different length less than 2MA decimal number;
responding to an instruction of a user enterprise calling the circuit symbol view and the encrypted netlist file;
and encrypting the encrypted SPICE netlist file according to a decryption key in the key pair, and realizing the simulation of the circuit diagram view on the basis of the decrypted SPICE netlist file.
5. An apparatus for applying the encryption and decryption method based on SPICE netlist and model as claimed in any one of claims 1 to 3, comprising:
the first input interface module is used for receiving a circuit diagram view provided by a research and development enterprise and a SPICE netlist corresponding to the circuit diagram view; converting the circuit diagram view into a circuit symbol view, and representing all circuit models adopted by the circuit diagram view and configuration information of the circuit models by the SPICE netlist in a code language;
the key pair generation module is used for responding to an encryption request of a research and development enterprise user and randomly generating a key pair;
the encryption module encrypts the SPICE netlist file according to an encryption key in the key pair to form an encrypted SPICE netlist file; wherein each character in the encrypted netlist file becomes a different length less than 2MA decimal number;
the second input interface module is used for receiving and calling the circuit symbol view and the encrypted netlist file by an enterprise;
the decryption module encrypts the encrypted SPICE netlist file according to a decryption key in the key pair, and decrypts the encrypted netlist file;
and the simulation module is used for realizing the simulation of the circuit diagram view based on the decrypted SPICE netlist file.
CN202110556684.3A 2021-05-21 2021-05-21 Encryption and decryption method, device and computer readable medium for SPICE netlist and model Pending CN113420304A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110556684.3A CN113420304A (en) 2021-05-21 2021-05-21 Encryption and decryption method, device and computer readable medium for SPICE netlist and model

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110556684.3A CN113420304A (en) 2021-05-21 2021-05-21 Encryption and decryption method, device and computer readable medium for SPICE netlist and model

Publications (1)

Publication Number Publication Date
CN113420304A true CN113420304A (en) 2021-09-21

Family

ID=77712705

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110556684.3A Pending CN113420304A (en) 2021-05-21 2021-05-21 Encryption and decryption method, device and computer readable medium for SPICE netlist and model

Country Status (1)

Country Link
CN (1) CN113420304A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115392160A (en) * 2022-06-10 2022-11-25 无锡芯光互连技术研究院有限公司 Format conversion method of circuit diagram description file
TWI821824B (en) * 2021-12-16 2023-11-11 上銀科技股份有限公司 Method and system of automatically loading of parameters, and serving-end server and client-end server thereof

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110099369A1 (en) * 2009-10-22 2011-04-28 Hon Hai Precision Industry Co., Ltd. File encryption system and method
CN104486073A (en) * 2014-12-23 2015-04-01 南通大学 Encryption and decryption method of character data
CN109245892A (en) * 2018-11-13 2019-01-18 常熟理工学院 Variable length key RSA cryptographic algorithms big data information security processing method and system
CN109245891A (en) * 2018-09-13 2019-01-18 国云科技股份有限公司 A kind of random key generation method based on RSA Algorithm
CN112052465A (en) * 2020-08-27 2020-12-08 中国科学院微电子研究所 Protection method for integrated circuit diagram design

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110099369A1 (en) * 2009-10-22 2011-04-28 Hon Hai Precision Industry Co., Ltd. File encryption system and method
CN104486073A (en) * 2014-12-23 2015-04-01 南通大学 Encryption and decryption method of character data
CN109245891A (en) * 2018-09-13 2019-01-18 国云科技股份有限公司 A kind of random key generation method based on RSA Algorithm
CN109245892A (en) * 2018-11-13 2019-01-18 常熟理工学院 Variable length key RSA cryptographic algorithms big data information security processing method and system
CN112052465A (en) * 2020-08-27 2020-12-08 中国科学院微电子研究所 Protection method for integrated circuit diagram design

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI821824B (en) * 2021-12-16 2023-11-11 上銀科技股份有限公司 Method and system of automatically loading of parameters, and serving-end server and client-end server thereof
CN115392160A (en) * 2022-06-10 2022-11-25 无锡芯光互连技术研究院有限公司 Format conversion method of circuit diagram description file
CN115392160B (en) * 2022-06-10 2024-04-09 无锡芯光互连技术研究院有限公司 Format conversion method for circuit diagram description file

Similar Documents

Publication Publication Date Title
Best et al. Model-based security engineering of distributed information systems using UMLsec
US7949987B1 (en) Method and system for implementing abstract layout structures with parameterized cells
CN113420304A (en) Encryption and decryption method, device and computer readable medium for SPICE netlist and model
JP2000090143A (en) Device and method for modeling time variation system
WO2019040215A1 (en) Private verification for fpga bitstreams
Hagras et al. Low power and high-speed FPGA implementation for 4D memristor chaotic system for image encryption
US20150172044A1 (en) Order-preserving encryption system, encryption device, decryption device, encryption method, decryption method, and programs thereof
CN111783124A (en) Data processing method and device based on privacy protection and server
Foo et al. An integrated help desk support for customer services over the World Wide Web—a case study
CN109547201A (en) A kind of encryption method of root key, computer readable storage medium and terminal device
US10467366B2 (en) Methods and systems for simulating high-speed link designs
CN104281272A (en) Password input processing method and device
US9270455B1 (en) CPU assisted seeding of a random number generator in an externally provable fashion
CN114416773B (en) Data processing method, device, storage medium and server
JP2004171367A (en) Circuit operation simulation device, circuit operation simulation method, circuit operation simulation program, and circuit information decoding program
US10013517B1 (en) High level programming language core protection for high level synthesis
McMillan et al. JBits™ implementations of the advanced encryption standard (Rijndael)
US9065638B2 (en) System, method, and program for information management
CN109491280A (en) A kind of interlocking device of realization software and hardware
CN111949655A (en) Form display method and device, electronic equipment and medium
CN1328654C (en) Function limiting program, mounting program generation program and program storage medium
Temirbekova et al. Improving teachers’ skills to integrate the microcontroller technology in computer engineering education
CN114297274A (en) Big data extraction method and device, computer equipment and storage medium
US20170352296A1 (en) Encoding device
CN112052465A (en) Protection method for integrated circuit diagram design

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 201210 room 822, building 2, No. 111, Xiangke Road, China (Shanghai) pilot Free Trade Zone, Pudong New Area, Shanghai

Applicant after: Julin Technology (Shanghai) Co.,Ltd.

Address before: 201210 room 822, building 2, No. 111, Xiangke Road, China (Shanghai) pilot Free Trade Zone, Pudong New Area, Shanghai

Applicant before: Julin (Shanghai) Microelectronics Co.,Ltd.