2015
DOI: 10.7251/els1519014k
|View full text |Cite
|
Sign up to set email alerts
|

Cost Effective Implementation of Fixed Point Adders for LUT based FPGAs using Technology Dependent Optimizations

Abstract: Modern day field programmable gate arrays(FPGAs) have very huge and versatile logic resources resulting inthe migration of their application domain from prototypedesigning to low and medium volume production designing.Unfortunately most of the work pertaining to FPGAimplementations does not focus on the technology dependentoptimizations that can implement a desired functionality withreduced cost. In this paper we consider the mapping of simpleripple carry fixed-point adders (RCA) on look-up table (LUT)based FP… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 34 publications
0
1
0
Order By: Relevance
“…Hence, the design becomes bigger and runs at slower clock rates, which results in an inefficient design in terms of area and speed. Compared with this, instantiation of the LUT primitives ensures a controlled mapping of the optimized logic that can help to get efficient utilization of LUT resources of an FPGA, and this makes the proposed design more efficient with minimum area and high speed. Details of each phase implementation of SHA‐3 are explained later.…”
Section: Proposed Implementation Of Secure Hash Algorithm‐3 Corementioning
confidence: 99%
“…Hence, the design becomes bigger and runs at slower clock rates, which results in an inefficient design in terms of area and speed. Compared with this, instantiation of the LUT primitives ensures a controlled mapping of the optimized logic that can help to get efficient utilization of LUT resources of an FPGA, and this makes the proposed design more efficient with minimum area and high speed. Details of each phase implementation of SHA‐3 are explained later.…”
Section: Proposed Implementation Of Secure Hash Algorithm‐3 Corementioning
confidence: 99%