Please use this identifier to cite or link to this item:
|Title:||Designs and comparisons of authentication modules for IPSec in configurable and extensible embedded processor||Authors:||Michail, Harris
Athanasiou, George S.
|Keywords:||Cryptography;Lead;Embedded computer systems;Security||Category:||Electrical Engineering - Electronic Engineering - Information Engineering||Field:||Engineering and Technology||Issue Date:||Dec-2010||Publisher:||IEEE||Source:||(2010) 2010 IEEE International Conference on Electronics, Circuits, and Systems, ICECS 2010 - Proceedings, art. no. 5724499, pp. 243-246; IEEE International Conference on Electronics, Circuits, and Systems, ICECS, 2010, Athens||Conference:||IEEE International Conference on Electronics, Circuits, and Systems||Abstract:||In this paper, a performance analysis of two alternative designs of SHA-1 hash function and a pure software version, implemented in a configurable and extensible embedded processor (Tensilica's Xtensa LX2) is presented. The first alternative is exploiting extensibility of incorporated platform; the second one is exploiting configurability and extensibility. These two alternatives are compared to the pure software implementation in the same processor. The results showed that exploiting both configurability and extensibility leads to high performance SHA-1 implementation. Up to 490% increase in terms of throughput is observed, while the area is significantly reduced by 28%. This work aims to offer base implementations for comparisons with future opts that authors are already working on.||ISBN:||978-142448157-6||DOI:||10.1109/ICECS.2010.5724499||Rights:||©2010 IEEE||Type:||Conference Papers|
|Appears in Collections:||Δημοσιεύσεις σε συνέδρια/Conference papers|
Show full item record
checked on Aug 22, 2019
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.