EP3C5F256C8N Altera, EP3C5F256C8N Datasheet - Page 235

IC CYCLONE III FPGA 5K 256-FBGA

EP3C5F256C8N

Manufacturer Part Number
EP3C5F256C8N
Description
IC CYCLONE III FPGA 5K 256-FBGA
Manufacturer
Altera
Series
Cyclone® IIIr

Specifications of EP3C5F256C8N

Number Of Logic Elements/cells
5136
Number Of Labs/clbs
321
Total Ram Bits
423936
Number Of I /o
182
Voltage - Supply
1.15 V ~ 1.25 V
Mounting Type
Surface Mount
Operating Temperature
0°C ~ 85°C
Package / Case
256-FBGA
No. Of Logic Blocks
321
Family Type
Cyclone III
No. Of I/o's
182
I/o Supply Voltage
3.3V
Operating Frequency Max
402MHz
Operating Temperature Range
0°C To +85°C
Rohs Compliant
Yes
For Use With
544-2601 - KIT DEV CYCLONE III LS EP3CLS200544-2411 - KIT DEV NIOS II CYCLONE III ED.
Lead Free Status / RoHS Status
Lead free / RoHS Compliant
Number Of Gates
-
Other names
544-2423
EP3C5F256C8N

Available stocks

Company
Part Number
Manufacturer
Quantity
Price
Part Number:
EP3C5F256C8N
Manufacturer:
ALTERA
Quantity:
853
Part Number:
EP3C5F256C8N
Manufacturer:
Altera
Quantity:
10 000
Part Number:
EP3C5F256C8N
Manufacturer:
ALTERA
0
Part Number:
EP3C5F256C8N
Manufacturer:
ALTERA
Quantity:
10
Part Number:
EP3C5F256C8N
Manufacturer:
ALTERA/阿尔特拉
Quantity:
20 000
Part Number:
EP3C5F256C8N
0
Chapter 9: Configuration, Design Security, and Remote System Upgrades in the Cyclone III Device Family
Design Security
Cyclone III LS Design Security Solution
© December 2009
f
f
Altera Corporation
For more information about the battery specifications, refer to the
Data Sheet
Cyclone III LS devices are SRAM-based devices. To provide design security,
Cyclone III LS devices require a 256-bit volatile key for configuration bitstream
encryption.
The Cyclone III LS design security feature provides routing architecture optimization
for design separation flow with the Quartus II software. Design separation flow
achieves both physical and functional isolation between design partitions.
For more information about the design separation flow, refer to
Design Separation Flow.
You can carry out secure configuration in Steps 1–3, as shown in
1. Generate the encryption key programming file and encrypt the configuration data.
2. Program the volatile key into the Cyclone III LS device.
3. Configure the Cyclone III LS device.
Figure 9–31. Cyclone III LS Secure Configuration Flow
Note to
(1) Step 1, Step 2, and Step 3 correspond to the procedure detailed in
The Quartus II configuration software uses the user-defined 256-bit volatile keys
to generate a key programming file and an encrypted configuration file. The
encrypted configuration file is stored in an external memory, such as a flash
memory or a configuration device.
Program the user-defined 256-bit volatile keys into the Cyclone III LS device
through the JTAG interface.
At system power-up, the external memory device sends the encrypted
configuration file to the Cyclone III LS device.
Figure
Step 1. Generate the Encryption Key Programming File
Configuration
Data
chapter.
9–31:
Encrypt Configuration Data and Store in External Memory
Quartus II
Volatile Key
Encryptor
AES
Programming File
Configuration
Encryption Key
Encrypted
Data
Configuration
Encrypted
Memory
Storage
Data
(Note 1)
“Cyclone III LS Design Security
Configuration
Step 2. Program Volatile Key into
Cyclone III LS Device
Encrypted
Step 3. Configure the Cyclone III LS Device
Using Encrypted Configuration Data
Data
Cyclone III Device Handbook, Volume 1
AN 567: Quartus II
Figure
Key Storage
Volatile Key
Cyclone III LS Device
Decryptor
Volatile
FPGA
AES
9–31:
Solution”.
9–75

Related parts for EP3C5F256C8N