2012
DOI: 10.15803/ijnc.2.1_56
|View full text |Cite
|
Sign up to set email alerts
|

GALS-based LPSP: Performance Analysis of a Novel Architecture for Low Power High Performance Security Processors

Abstract: The past two decades have witnessed a revolution in the use of electronic devices in our daily activities. Increasingly, such activities involve the exchange of personal and sensitive data by means of portable and light weight devices. This implied the use of security applications in devices with tight processing capability and low power budget. Current architectures for processors that run security applications are optimized for either high-performance or low energy consumption. We propose an implementation f… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 23 publications
0
4
0
Order By: Relevance
“…The architecture of the novel crypto processor proposed previously [22] , [23] inherits features both from the transport-triggered paradigm and the dataflow paradigm. Thus, instructions control the bypass circuits rather than the FUs; the FU operation is triggered by the presence of its operands; and the results are passed between the FUs instead of returning back to a register file.…”
Section: Design Background Of the Novel Crypto Processormentioning
confidence: 99%
See 3 more Smart Citations
“…The architecture of the novel crypto processor proposed previously [22] , [23] inherits features both from the transport-triggered paradigm and the dataflow paradigm. Thus, instructions control the bypass circuits rather than the FUs; the FU operation is triggered by the presence of its operands; and the results are passed between the FUs instead of returning back to a register file.…”
Section: Design Background Of the Novel Crypto Processormentioning
confidence: 99%
“…Any security algorithm can be encoded in an assembly code written using instructions that have a standardized format. As described in [22] , [23] , each instruction specifies the FU responsible for executing the operation and the FU(s) to which the outcome should be forwarded. One instruction can identify one or two destination FUs.…”
Section: Design Background Of the Novel Crypto Processormentioning
confidence: 99%
See 2 more Smart Citations