Resource Efficiency of Hardware Extensions of a 4-issue VLIW Processor for Elliptic Curve Cryptography
Jungeblut T, Puttmann C, Dreesen R, Porrmann M, Thies M, Rückert U, Kastens U (2010)
Advances in Radio Science 8: 295-305.
Zeitschriftenaufsatz
| Veröffentlicht | Englisch
Autor*in
Jungeblut, ThorstenUniBi ;
Puttmann, Christoph;
Dreesen, Ralf;
Porrmann, MarioUniBi ;
Thies, Michael;
Rückert, UlrichUniBi;
Kastens, Uwe
Einrichtung
Abstract / Bemerkung
The secure transmission of data plays a significant
role in todays information era. Especially in the area
of public-key-cryptography methods, which are based on elliptic curves (ECC), gain more and more importance. Compared to asymmetric algorithms, like RSA, ECC can be used with shorter key lengths, while achieving an equal level of security. The performance of ECC-algorithms can be increased significantly by adding application specific hardware extensions.
Due to their fine grained parallelism, VLIW-processors
are well suited for the execution of ECC algorithms. In
this work, we extended the fourfold parallel CoreVA-VLIW-architecture by several hardware accelerators to increase the resource efficiency of the overall system. For the designspace exploration we use a dual design flow, which is based on the automatic generation of a complete C-compiler based tool chain from a central processor specification. Using the hardware accelerators the performance of the scalar multiplication on binary fields can be increased by the factor of 29. The energy consumption can be reduced by up to 90%. The extended processor hardware was mapped on a current 65 nm low-power standard-cell-technology. The chip area of the CoreVA-VLIW-architecture is 0.24mm2 at a power consumption
of 29 mW/MHz. The performance gain is analyzed in respect to the increased hardware costs, as chip area or
power consumption.
Erscheinungsjahr
2010
Zeitschriftentitel
Advances in Radio Science
Band
8
Seite(n)
295-305
ISSN
1684-9973
eISSN
1684-9973
Page URI
https://pub.uni-bielefeld.de/record/2018541
Zitieren
Jungeblut T, Puttmann C, Dreesen R, et al. Resource Efficiency of Hardware Extensions of a 4-issue VLIW Processor for Elliptic Curve Cryptography. Advances in Radio Science. 2010;8:295-305.
Jungeblut, T., Puttmann, C., Dreesen, R., Porrmann, M., Thies, M., Rückert, U., & Kastens, U. (2010). Resource Efficiency of Hardware Extensions of a 4-issue VLIW Processor for Elliptic Curve Cryptography. Advances in Radio Science, 8, 295-305. https://doi.org/10.5194/ars-8-295-2010
Jungeblut, Thorsten, Puttmann, Christoph, Dreesen, Ralf, Porrmann, Mario, Thies, Michael, Rückert, Ulrich, and Kastens, Uwe. 2010. “Resource Efficiency of Hardware Extensions of a 4-issue VLIW Processor for Elliptic Curve Cryptography”. Advances in Radio Science 8: 295-305.
Jungeblut, T., Puttmann, C., Dreesen, R., Porrmann, M., Thies, M., Rückert, U., and Kastens, U. (2010). Resource Efficiency of Hardware Extensions of a 4-issue VLIW Processor for Elliptic Curve Cryptography. Advances in Radio Science 8, 295-305.
Jungeblut, T., et al., 2010. Resource Efficiency of Hardware Extensions of a 4-issue VLIW Processor for Elliptic Curve Cryptography. Advances in Radio Science, 8, p 295-305.
T. Jungeblut, et al., “Resource Efficiency of Hardware Extensions of a 4-issue VLIW Processor for Elliptic Curve Cryptography”, Advances in Radio Science, vol. 8, 2010, pp. 295-305.
Jungeblut, T., Puttmann, C., Dreesen, R., Porrmann, M., Thies, M., Rückert, U., Kastens, U.: Resource Efficiency of Hardware Extensions of a 4-issue VLIW Processor for Elliptic Curve Cryptography. Advances in Radio Science. 8, 295-305 (2010).
Jungeblut, Thorsten, Puttmann, Christoph, Dreesen, Ralf, Porrmann, Mario, Thies, Michael, Rückert, Ulrich, and Kastens, Uwe. “Resource Efficiency of Hardware Extensions of a 4-issue VLIW Processor for Elliptic Curve Cryptography”. Advances in Radio Science 8 (2010): 295-305.
Alle Dateien verfügbar unter der/den folgenden Lizenz(en):
Copyright Statement:
Dieses Objekt ist durch das Urheberrecht und/oder verwandte Schutzrechte geschützt. [...]
Volltext(e)
Access Level
Open Access
Zuletzt Hochgeladen
2019-09-06T08:57:29Z
MD5 Prüfsumme
259a931215e9cdefcd49261df8bdc61b
Link(s) zu Volltext(en)
Access Level
Closed Access