2012 IEEE 3rd Latin American Symposium on Circuits and Systems (LASCAS) 2012
DOI: 10.1109/lascas.2012.6180296
|View full text |Cite
|
Sign up to set email alerts
|

Power analysis and optimization of the ZUC stream cipher for LTE-Advanced mobile terminals

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 14 publications
(9 citation statements)
references
References 6 publications
0
9
0
Order By: Relevance
“…The number of toggles of every individual I/O pin of the router and their probability of remaining in logic-1 state for the entire simulation window has been calculated from the NoC simulator. This information is then fed to Synopsys Prime Power tool [53] to estimate the power of each router with the following parameters: Process = typical, Supply Voltage = 1 V, Temperature = 75 °C and router clock period = 666 ps [9][10], [50], [54]- [56]. Table 3 shows comparison of mapping solutions obtained via different approaches, in terms of energy consumption.…”
Section: Energy Comparisonmentioning
confidence: 99%
“…The number of toggles of every individual I/O pin of the router and their probability of remaining in logic-1 state for the entire simulation window has been calculated from the NoC simulator. This information is then fed to Synopsys Prime Power tool [53] to estimate the power of each router with the following parameters: Process = typical, Supply Voltage = 1 V, Temperature = 75 °C and router clock period = 666 ps [9][10], [50], [54]- [56]. Table 3 shows comparison of mapping solutions obtained via different approaches, in terms of energy consumption.…”
Section: Energy Comparisonmentioning
confidence: 99%
“…Finally, the confidentiality algorithm (128-EEA3) adopted to encrypt user data in Packet Data Convergence Protocol (PDCP which is part of Layer 2 in LTE protocol) [16,17].…”
Section: Zuc Algorithmmentioning
confidence: 99%
“…Hardware architectures for core ciphers of several LTE con�dentiality algorithms were separately implemented in various works [16][17][18], where the main focus was to deliver high speed FPGA or ASIC designs. Few recent works [19,20] proposed compact and power-efficient architectures for both 128-EEA1 and 128-EEA3 ciphering algorithms. However, previous works proposing low-power implementations of AES, the core cipher of 128-EEA2, are limited to the byte substitution function [21][22][23][24].…”
Section: Related Workmentioning
confidence: 99%