Visible to Intel only — GUID: sss1415693156181
Ixiasoft
1. Intel® MAX® 10 FPGA Configuration Overview
2. Intel® MAX® 10 FPGA Configuration Schemes and Features
3. Intel® MAX® 10 FPGA Configuration Design Guidelines
4. Intel® MAX® 10 FPGA Configuration IP Core Implementation Guides
5. Dual Configuration Intel® FPGA IP Core References
6. Unique Chip ID Intel® FPGA IP Core References
7. Document Revision History for the Intel® MAX® 10 FPGA Configuration User Guide
3.1. Dual-Purpose Configuration Pins
3.2. Configuring Intel® MAX® 10 Devices using JTAG Configuration
3.3. Configuring Intel® MAX® 10 Devices using Internal Configuration
3.4. Implementing ISP Clamp in Intel® Quartus® Prime Software
3.5. Accessing Remote System Upgrade through User Logic
3.6. Error Detection
3.7. Enabling Data Compression
3.8. AES Encryption
3.9. Intel® MAX® 10 JTAG Secure Design Example
Visible to Intel only — GUID: sss1415693156181
Ixiasoft
3.8.3. Programming .ekp File and Encrypted POF File
There are two methods to program the encrypted .pof and .ekp files:
- Program the .ekp and .pof separately.
Note: You only can program the .ekp and .pof separately when Allow encrypted POF only option is disabled.
- Integrate the .ekp into .pof and program both altogether.