The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2016
DOI: 10.14257/ijseia.2016.10.6.07
|View full text |Cite
|
Sign up to set email alerts
|

FPGA Based Low Power DES Algorithm Design and Implementation using HTML Technology

Abstract: In this particular work, we have done power analysis of DES algorithm implemented on 28nm FPGA using HTML (H-HSUL, T-TTL, M-MOBILE_DDR, L-LVCMOS) technology. In this research, we have used high performance software Xilinx ISE where we have selected four different IO Standards i.e. MOBILE_DDR, HSUL_12, LVTTL and LVCMOS (LVCMOS_15, LVCMOS_18, LVCMOS_25 and LVCMOS_33). We have done power analysis of on-chip power like clock power, signals power, IO power, leakage power and supply power. We notified our analysis a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 10 publications
(9 citation statements)
references
References 12 publications
0
9
0
Order By: Relevance
“…multiplier based on HSTL IO Standard [6], DES Algorithm Design [7] and Arithmetic Logic Unit Design on 28nm FPGA using SSTL [8] .…”
Section: A Cmos-based Tactile Sensor For Continuous Blood Pressure Momentioning
confidence: 99%
“…multiplier based on HSTL IO Standard [6], DES Algorithm Design [7] and Arithmetic Logic Unit Design on 28nm FPGA using SSTL [8] .…”
Section: A Cmos-based Tactile Sensor For Continuous Blood Pressure Momentioning
confidence: 99%
“…The traditional symmetric/asymmetric algorithms are used for the data security such as DES [27][28][29], triple DES [30], elliptic curve cryptography (ECC) [31][32][33][34], Rivest-Shamir-Adleman (RSA) [35], etc. In these algorithms, ECC and RSA are well known asymmetrickey-cryptography that use public keys for encryption/decryption processes.…”
Section: Introductionmentioning
confidence: 99%
“…This work uses composite field arithmetic structure both SubBytes and InvSubBytes transformations with the speed efficient subpiplining structure. Earlier approach of implementing CFA is to decompose GF (28) as GF(((22)2)2). Where in this work GF (28) is decomposed as GF((24)2).…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…High energy consumption is one of the major challenges to be solved in designing the NUMA multicore systems and other systems [1,25]. The memory access time imbalance among cores in different nodes is one source of energy inefficiency.…”
Section: Introductionmentioning
confidence: 99%