From all-round academic master to chief scientist

Chapter 338 The EDA giant couldn’t believe it

With the launch of Anhua EDA software, the domestic chip design industry has gradually calmed down from the initial panic.

This major turmoil that might have caused collective unemployment in an industry in China ended quietly like this.

This is probably something no one would have thought of.

The intelligent detection function of feint attacks in Anhua EDA software is a new feature that every practitioner can’t help but exclaim.

Germany, Siemens Mentor GmbH.

Mentor is one of the world's three largest EDA giants and has a very high share of the world's EDA software market.

At this time, in the R\u0026D department of Mentor Company, there were a large number of programmers working on the same task at the same time.

That is to analyze Anwar EDA, a powerful competitor that emerged out of nowhere.

First, we need to see if the Anwar EDA software infringes on their patent rights, and then we will look at what the software’s so-called intelligent detection function of feigned attacks is and how it is implemented.

"Oh my God, these programs are really too perfect!"

Suddenly, someone couldn't help but exclaimed.

Hearing this voice, others couldn't help but start talking.

"Yes! The people who wrote these programs are definitely geniuses!"

"This simulation program can actually make such simplifications! It's really amazing!"

"..."

These are considered top programmers in the EDA software industry, but at this time they are amazed by the programs in this software.

When their supervisor heard these voices, he couldn't help but wonder: "What are you talking about?"

"Oh! Hartman, you will understand when you look at these codes."

Someone immediately waved to their supervisor.

Hartman walked over and looked at the program above. Being the supervisor of so many programmers, he is naturally a very powerful programmer. After all, he is not a product manager.

Then, he quickly said in surprise: "This code... is really amazing!"

This simply reminded him of the two people who published the paper "Introduction to Very Large Scale Integrated Circuit Systems" in 1981. It was these two people who inspired the birth of EDA software, and the person who wrote the programs in front of him was also an A talented programmer.

"Could this also be done by Lin Xiao? Not only can he come up with a super physical theory such as multi-dimensional field theory, but he can also write such a powerful program?"

The Mentor programmer couldn't help but say.

Hartman shook his head and said: "No, it is said to be another person, the boss of Anwar Company..."

"That's it." The programmer asked: "Then what's the name of the program that pretends to attack intelligent detection? Was this created by Lin Xiao?"

"Yes."

Speaking of this, Hartman couldn't help but wonder, why hasn't the team responsible for cracking this function responded yet?

"You keep working."

After saying this, he stood up and left, walking towards the team responsible for cracking this work.

However, when he arrived at the group's place, he saw that these people had troubled expressions on their faces.

This made him suspicious, and he asked one of them: "Dane, what's going on with you guys? Have you encountered any problems?"

"Isn't it?" Dane said helplessly: "We don't understand the principle of this program."

Hartman was immediately surprised: "You still don't understand?"

Is the program for this function so complicated?

They want to hack this function, naturally to copy this function and then try to get it into their software.

This is not a matter of copying and pasting. Although as the saying goes, a lot of code can be copied in the world, but their software has to face a multi-billion dollar market, plus it has monopoly, if they change everything If you just copy and paste without changing it, you will easily be taken to court and you will definitely lose.

But how to change it into something that completely belongs to them requires understanding the principles on which this program can run, that is, the logic and mathematical model behind it.

However, they still couldn't understand it.

There's nothing you can do about it. It's impossible to add comments to the software released by other people. Even if comments are added, there is a high probability that they will be in Chinese.

In Anhua EDA, except for the code written using letters and symbols, other places where Chinese can be used are basically all in Chinese.

This directly broke the defense of these German programmers.

Who the hell can read Chinese?

This Anhua company does not respect martial ethics. The language options only have Simplified Chinese, not even Traditional Chinese.

Do you still want to make money without using English?

This also caused the programmers from China in their company to become popular and were approached by many people to help translate the Chinese content inside.

Of course, it is normal for Dane and the others not to understand this program. They do not study cryptography, let alone the birthday paradox and birthday attack. What’s more, the mathematical principle developed by Lin Xiao combines these two After abstracting the principle of this thing and adding many things, it is no longer the original simple birthday paradox and birthday attack.

Hartman suddenly frowned. Even the programmers in their company couldn't understand it. Could it be that they need to find foreign help?

At this moment, someone behind him shouted: "Hartman."

Hartman turned to look and immediately shouted: "President."

This person is none other than Schmidt, their president.

Schmidt asked: "How far has the Chinese software been cracked? How about their unique function?"

Hartman's face showed embarrassment: "Dane and the others have encountered a little problem."

"A little question?"

Schmidt was stunned: "What's the problem?"

"They can't understand this program." After Hartman said this, his eyes suddenly lit up, because he remembered that Schmidt was also a programmer himself, and a very powerful programmer. Maybe he could see something. Coming?

So he immediately said: "President, why don't you come and take a look?"

Schmidt nodded. He wanted to know how complicated this program was that even their programmers couldn't understand it. You have to know that many of their programmers here are old programmers who have been working for decades?

He walked up, and Dane quickly made way for the president.

After Schmidt sat down, he looked at the code above.

There are about eighty lines of code, which is actually not too much for such a function. However, as Schmidt continued to read, his brows became deeper and deeper.

In this way, after he read it once, he went back and read it again, and from time to time he paused for a long time between certain lines.

The people nearby were extremely surprised to see that their president had been thinking about it for so long. They programmers all knew how capable this president was, but now their president couldn't figure out how to solve this problem?

It wasn't until more than an hour later that Schmidt, who had watched it many times, finally raised his head with a look of shock in his eyes, "This program seems to use something from cryptography."

"Cryptography?"

Everyone present was stunned. How could things in cryptography be used in their EDA software?

Schmidt nodded seriously: "Yes, it's cryptography. It even uses a method similar to cryptanalysis to easily realize the ability to detect circuits in a wide range. This is really... a bit incredible. !”

He was very shocked. If he hadn't been exposed to cryptography before, otherwise he really wouldn't be able to see this. However, he still didn't see the principle, but he had a feeling that even if he saw it, It is probably difficult to copy one.

Of course, people who understand will be shocked, while those around them who don’t understand will only feel confused.

Some people whispered: "Cryptoanalysis, isn't that what hackers study? Can it be used in this too?"

Others are also convinced that this little thing can actually use cryptanalysis, which is a complete supermodel to them.

There are specialties in the art industry, so it's understandable that they don't understand.

Schmidt stood up and said to Hartman: "I'll go back and study it again. You can let them do other work. This work is surprisingly difficult."

"Okay." Hartman nodded and asked others to start working.

Schmidt quickly left the office. No matter what, it was a shame that he had not studied this principle, so he only watched it for more than an hour and saw some tricks, and then he had the nerve to leave.

Of course, he also wanted to give North America a middle finger.

Leaving the Chinese market would be a huge loss for them.

And now that they have just left, someone else has developed a software that can compete with them, sweeping away the market that they gave up in vain. This makes them feel like they have eaten a fly. I can't say it.

"der-Angsthase!"

"Farke!"

Meanwhile, in the Oval Office at the White House, the president said he would rather curse.

"Who said Lin Xiao doesn't understand computers? Can you explain it to me? Secretary of State?"

The Secretary of State looked like a frustrated person.

How did he know?

What was originally a good move turned out to be a bad move.

He had a good plan. When the other party's chip design industry was cut in half, the industry's huge profits would be handed over to them. At the same time, it would also attract many talents from the other party and related outstanding companies.

As a result, all these expected plans have now come to nothing.

The Secretary of State just wants to say that everyone suspects that they have aliens, but now it seems that Lin Xiao is the most suspicious.

Looking at the Secretary of State, the President was very angry and said directly: "Next time you come up with a bad idea, be prepared to express your sympathy for the unemployed in the media in advance."

The Secretary of State was confused: "Sympathy?"

"Because then you'll be joining them!" the president roared.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like