期刊文献+

专用指令分组密码微处理器体系结构研究 被引量:3

Architecture of Block Ciphers Processor Based on Specific Instruction-Set Research
下载PDF
导出
摘要 本文以分组密码算法为研究对象,结合微处理器体系结构的特点,研究能够高效灵活实现多种分组密码算法的处理器体系结构。论文通过分析现有分组密码算法结构特点,从实现方式的灵活性和高性能角度出发,提出了一种基于专用指令集的分组密码微处理器的设计思路,并给出了分组密码微处理器的运算单元设计方案及整体系统架构。 Based on existing block ciphers and combined with characteristic of processor architecture, this paper has a research on high performance processor architecture for block cipher algorithms. Through analyzing the flexibility and speed of existing implemen- tation methods, a block ciphers processor architecture is presented, and also an optimum method of the operation unit design is given.
出处 《微计算机信息》 北大核心 2007年第03X期84-85,99,共3页 Control & Automation
基金 公安部金盾工程资助项目(编号不公开)
关键词 分组密码 专用指令集密码微处理器 流水线 超标量体系结构 指令级并行 Block Cipher Application-Specific Instruction-Set Cipher Processor Pipeline Superscalar ILP
  • 相关文献

参考文献4

  • 1Bruce R.Childers,Jack W.Davidson.An Infrastructure for Designing Custom Embedded Counterfiow Pipelines[J].Proc.of System Sciences,2000:1-2.
  • 2梁松峰,梁杰申,胡耀辉.对称密码学在工业设备保密中的应用[J].微计算机信息,2005,21(08X):20-21. 被引量:3
  • 3Bruce Schneier(美)著,吴世忠、祝世雄、张文政译.应用密码学[M].北京:机械工业出版社,2000:225-233.
  • 4安虹.系结构高性能微处理器芯片体关键技术途径探讨.中国科学院计算技术研究所内部刊物-信息技术快报,2004,12:6-8.

二级参考文献1

  • 1何信龙 李雪银.《PIC16C7X入门与应用范例》[M].清华大学出版社,2001..

共引文献3

同被引文献13

  • 1解咏梅,张珩,张福新.基于覆盖率的功能验证方法[J].计算机应用研究,2005,22(1):23-24. 被引量:8
  • 2Steven S.Muchnick .Advanced Compiler Design and Implementation.[M] Elsevier Science, 2003,9
  • 3Monica Lam. Software Pipelining.An effective scheduling technique for VLIW Machine [J], ACM PLDI, 1988,318-328
  • 4Fisher J A. Trace scheduling, a technique for global microcode compaction. [J], IEEE Transactions on Computers, 1981, 478-492
  • 5Sanjeev Banerjia et al. Treegion Scheduling for Highly Parallel Processors [J], In Proceedings of Euro-Par'97,Passau, Germany, Aug. 1997, 1074 -1078
  • 6W. W. Hwu et al. The Superblock: An Effective Structure for VLIW and Superscalar Compilation [J], Journal of Supercomputing, 1993,229-248
  • 7Shannon.Communicationtheoryofsecrecysystems[J].BellSystem TecnhiclaJournla,1949,28(4):656-715.
  • 8Frank R. The Classification Tree Method by Frank Buchne[EB/OL]. (2011-11-01). http://wenku.baidu.com/view.f700 343383c4bb4cf7eedl aa.html.
  • 9Krupp A, Mueller W. Classification Trees for Random Tests and Functional Coverage[C]//Proc. of 2006 Design, Automation & Test Conference. Munich, Germany: [s. n.], 2006: 1030-1031.
  • 10Feng Xinyu, Jiang Hongbo, Liu Zhaoyong. A New Method to Optimize Function Verification[C]//Proc. of 2011 International Conference on Digital Object Identifier. Hawaii, USA: [s. n.], 2011 5642-5644.

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部