Please use this identifier to cite or link to this item:
Title: Designs and comparisons of authentication modules for IPSec in configurable and extensible embedded processor
Authors: Michail, Harris 
Athanasiou, George S. 
Makridakis, George 
Keywords: Cryptography;Lead;Embedded computer systems;Security
Category: Electrical Engineering - Electronic Engineering - Information Engineering
Field: Engineering and Technology
Issue Date: Dec-2010
Publisher: IEEE
Source: (2010) 2010 IEEE International Conference on Electronics, Circuits, and Systems, ICECS 2010 - Proceedings, art. no. 5724499, pp. 243-246; IEEE International Conference on Electronics, Circuits, and Systems, ICECS, 2010, Athens
Conference: IEEE International Conference on Electronics, Circuits, and Systems 
Abstract: In this paper, a performance analysis of two alternative designs of SHA-1 hash function and a pure software version, implemented in a configurable and extensible embedded processor (Tensilica's Xtensa LX2) is presented. The first alternative is exploiting extensibility of incorporated platform; the second one is exploiting configurability and extensibility. These two alternatives are compared to the pure software implementation in the same processor. The results showed that exploiting both configurability and extensibility leads to high performance SHA-1 implementation. Up to 490% increase in terms of throughput is observed, while the area is significantly reduced by 28%. This work aims to offer base implementations for comparisons with future opts that authors are already working on.
ISBN: 978-142448157-6
DOI: 10.1109/ICECS.2010.5724499
Rights: ©2010 IEEE
Type: Conference Papers
Appears in Collections:Δημοσιεύσεις σε συνέδρια/Conference papers

Show full item record

Page view(s)

Last Week
Last month
checked on Aug 22, 2019

Google ScholarTM



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.