EP4SGX360FH29C3N Altera, EP4SGX360FH29C3N Datasheet - Page 400

no-image

EP4SGX360FH29C3N

Manufacturer Part Number
EP4SGX360FH29C3N
Description
IC STRATIX IV FPGA 360K 780HBGA
Manufacturer
Altera
Series
Stratix® IV GXr

Specifications of EP4SGX360FH29C3N

Number Of Logic Elements/cells
353600
Number Of Labs/clbs
14144
Total Ram Bits
22564
Number Of I /o
289
Voltage - Supply
0.87 V ~ 0.93 V
Mounting Type
Surface Mount
Operating Temperature
0°C ~ 85°C
Package / Case
780-HBGA
Lead Free Status / RoHS Status
Lead free / RoHS Compliant
Number Of Gates
-

Available stocks

Company
Part Number
Manufacturer
Quantity
Price
Part Number:
EP4SGX360FH29C3N
Manufacturer:
Bussmann
Quantity:
40 000
Part Number:
EP4SGX360FH29C3N
Manufacturer:
ALTERA21
Quantity:
53
Part Number:
EP4SGX360FH29C3N
Manufacturer:
Altera
Quantity:
10 000
Part Number:
EP4SGX360FH29C3N
Manufacturer:
ALTERA
0
10–66
Stratix IV Device Handbook Volume 1
Stratix IV Design Security Solution
f
f
1
1
Table 10–19. Security Key Options (Part 2 of 2)
You can program the non-volatile key to the Stratix IV device without an external
battery. Also, there are no additional requirements to any of the Stratix IV power
supply inputs.
V
on-chip power supplies, such as V
the volatile register regardless of the on-chip supply condition.
After power-up, you must wait 300 ms (PORSEL = 0) or 12 ms (PORSEL = 1) before
beginning key programming to ensure that V
For more information about how to calculate the key retention time of the battery
used for volatile key storage, refer to the
and HardCopy IV PowerPlay Early Power
For more information about battery specifications, refer to the
Characteristics in Stratix IV Devices
For more information about the V
Stratix IV GX and Stratix IV E Device Family Pin Connection
Stratix IV devices are SRAM-based devices. To provide design security, Stratix IV
devices require a 256-bit security key for configuration bitstream encryption.
You can carry out secure configuration in the following steps, as shown in
Figure
1. Program the security key into the Stratix IV device.
2. Program the user-defined 256-bit AES keys to the Stratix IV device through the
3. Encrypt the configuration file and store it in the external memory.
4. Encrypt the configuration file with the same 256-bit keys used to program the
5. Configure the Stratix IV device.
Design protection
Note to
(1) Key programming is carried out using the JTAG interface.
CCBAT
JTAG interface.
Stratix IV device. Encryption of the configuration file is done using the Quartus II
software. The encrypted configuration file is then loaded into the external
memory, such as a configuration or flash device.
Table
10–29:
is a dedicated power supply for volatile key storage and not shared with other
Options
10–19:
Chapter 10: Configuration, Design Security, and Remote System Upgrades in Stratix IV Devices
Secure against copying and
reverse engineering
CCBAT
CCIO
chapter.
Volatile Key
or V
Estimator.
pin connection recommendations, refer to the
Stratix III, Stratix IV, Stratix V, HardCopy III
CC
. V
CCBAT
CCBAT
is at full rail.
continuously supplies power to
Secure against copying and
reverse engineering. Tamper
resistant if tamper protection
bit is set.
Guidelines.
DC and Switching
April 2011 Altera Corporation
Non-Volatile Key
Design Security

Related parts for EP4SGX360FH29C3N