2008 11th IEEE Workshop on Design and Diagnostics of Electronic Circuits and Systems 2008
DOI: 10.1109/ddecs.2008.4538778
|View full text |Cite
|
Sign up to set email alerts
|

Cryptographic System on a Chip based on Actel ARM7 Soft-Core with Embedded True Random Number Generator

Abstract: The paper introduces a cryptographic System on to settle for a proprietary 32-bit processor core. Instead, they a Chip (SoC) implementation based on recent Actel nonvolatile can use the industry-standard ARM7 with its well-known FPGA Fusion chip with embedded ARM7 soft-core processor. architecture.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2011
2011
2016
2016

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…The eBACS ECRYPT benchmark [6] gives values for 256-bit ECDSA of, for example, 1.88 ms for generation and 2.2 ms for verification on an Intel Core 2 Duo at 1.4 GHz and 2.9 ms respectively, 3.4 ms on an Intel Atom 330 at 1.6 GHz. Values for a crypto system based on an ARM7 32-bit microcontroller are given in [7] for a key bit length of 233 bit. Using a comb table precomputation (w = 4) 742 ms are needed for a generation and 1240 ms for a verification of an ECDSA signature.…”
Section: Related Workmentioning
confidence: 99%
“…The eBACS ECRYPT benchmark [6] gives values for 256-bit ECDSA of, for example, 1.88 ms for generation and 2.2 ms for verification on an Intel Core 2 Duo at 1.4 GHz and 2.9 ms respectively, 3.4 ms on an Intel Atom 330 at 1.6 GHz. Values for a crypto system based on an ARM7 32-bit microcontroller are given in [7] for a key bit length of 233 bit. Using a comb table precomputation (w = 4) 742 ms are needed for a generation and 1240 ms for a verification of an ECDSA signature.…”
Section: Related Workmentioning
confidence: 99%
“…The effect of the resonance between the AES cryptographic algorithm and the dataflow nature of the GALS-based LPSP is evident by the high throughput. GALS-based LPSP 5.3 Baseline LEON3 [2] 504.9 LEON3 with SPx [2] 184.5 LEON3 with HWAccel [14] 15.8 Baseline Xtensa LX2 [21] 1681 Xtensa with SPx [21] 18.9 Baseline CoreMP7 [7] 8.4…”
Section: Comparisonsmentioning
confidence: 99%
“…The predominant soft cores that have been adopted as a co-processor for security applications or their internal architecture has been modified to accommodate new instructions for cryptographic algorithms are the LEON2 [22], LEON3 [11,12], Xtensa LX2 [21], Xtensa T1040 [19], and CoreMP7 [7].…”
Section: Comparisonsmentioning
confidence: 99%