Please use this identifier to cite or link to this item:
Title: Designs and comparisons of authentication modules for IPSec in configurable and extensible embedded processor
Authors: Michail, Harris 
Athanasiou, George S. 
Makridakis, George 
Keywords: Cryptography;Lead;Embedded computer systems;Security
Issue Date: 2010
Publisher: IEEE
Source: IEEE International Conference on Electronics, Circuits, and Systems, ICECS, 2010, Athens
Abstract: In this paper, a performance analysis of two alternative designs of SHA-1 hash function and a pure software version, implemented in a configurable and extensible embedded processor (Tensilica's Xtensa LX2) is presented. The first alternative is exploiting extensibility of incorporated platform; the second one is exploiting configurability and extensibility. These two alternatives are compared to the pure software implementation in the same processor. The results showed that exploiting both configurability and extensibility leads to high performance SHA-1 implementation. Up to 490% increase in terms of throughput is observed, while the area is significantly reduced by 28%. This work aims to offer base implementations for comparisons with future opts that authors are already working on.
ISBN: 978-142448157-6
DOI: 10.1109/ICECS.2010.5724499
Rights: ©2010 IEEE
Type: Conference Papers
Appears in Collections:Δημοσιεύσεις σε συνέδρια/Conference papers

Show full item record

Page view(s)

Last Week
Last month
checked on Feb 20, 2019

Google ScholarTM



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.