Proceedings of the 5th Conference on Computing Frontiers 2008
DOI: 10.1145/1366230.1366272
|View full text |Cite
|
Sign up to set email alerts
|

Profiling of symmetric-encryption algorithms for a novel biomedical-implant architecture

Abstract: Starting with the implantable pacemaker, microelectronic implants have been around for more than 50 years. A plethora of commercial and research-oriented devices have been developed so far for a wide range of biomedical applications. In view of an envisioned expanding implant market in the years to come, our ongoing research work is focusing on the specification and design of a novel biomedical microprocessor core, carefully tailored to a large subset of existing and future biomedical applications. Towards thi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
10
0
1

Year Published

2008
2008
2020
2020

Publication Types

Select...
7
1

Relationship

4
4

Authors

Journals

citations
Cited by 15 publications
(12 citation statements)
references
References 27 publications
1
10
0
1
Order By: Relevance
“…5 further reveals that "misty" consumes less power but requires more area than "rc6" (and, thus, "all") while scoring better performance than either of them. This agrees with existing literature [23] and with the targeted applications of MISTY1 which are low-power, embedded systems. Its increased area requirements w.r.t.…”
Section: B Symmetric Encryptionsupporting
confidence: 92%
See 1 more Smart Citation
“…5 further reveals that "misty" consumes less power but requires more area than "rc6" (and, thus, "all") while scoring better performance than either of them. This agrees with existing literature [23] and with the targeted applications of MISTY1 which are low-power, embedded systems. Its increased area requirements w.r.t.…”
Section: B Symmetric Encryptionsupporting
confidence: 92%
“…EEG, EMG, blood pressure, pulmonary air volume). Without loss of generality, for this paper we have selected and executed only the 10 − KB EMG workload ("EMGII 10.bin", see [23] for details) as it exhibits worst-case performance characteristics and, thus, provides a lower-bound for processor design.…”
Section: Related Workmentioning
confidence: 99%
“…So far, extensive work has been performed for identifying and profiling common applications to be executed on such an architecture. Algorithms for lossless data compression [24], symmetric-key encryption [25] and error detection/correction as well as representative real-world applications have been evaluated and suitable candidates have been isolated. Moreover, a carefully selected benchmark suite for microelectronic implants has been proposed [26] to guide and assist future implant design.…”
Section: Processorsmentioning
confidence: 99%
“…Since modern IMDs are embedded computing systems in actuality, specially targeted computer viruses or malware could infect implantable devices and use them to spread, potentially damaging a large patient base [Gasson 2010]. Public awareness on the matter is gradually catching up [Leavitt 2010;Strydis et al 2008] and successful, in vitro attacks on implantable devices have already been demonstrated Li et al 2011] to verify that such fears are not unwarranted. The attacks on the Epilepsy Foundation website-where seizures were induced in some epileptic patients by replacing website content with rapidly flashing images [Poulson 2008]-have led to the certainty that malicious attacks on IMDs are simply a matter of time and, therefore, that security is required in order to protect the steadily increasing number of patients carrying wireless IMDs.…”
Section: Introductionmentioning
confidence: 99%