期刊文献+

SDTA:一种适合密码处理的处理器结构

SDTA:Processor Architecture Suitable for Cipher Processing
下载PDF
导出
摘要 提出一种基于同步数据触发结构(SDTA)的密码处理技术。利用SDTA的高并行、广谱适应和多态易用等特点,满足密码处理的高性能、强适应性和抗攻击性等要求。基于该结构的设计优化流程进行应用分析,得出瓶颈操作,通过设计相应的计算加速单元实现应用加速,且新单元可以方便地加入该结构内核中,从而减少处理器的设计时间。 This paper proposes a kind of cipher processing technology based on Synchronous Data Triggered Architecture(SDTA),which makes use of the characteristics of SDTA such as high parallelism,high adaptability and polymorphism to meet the demands of high performance,strong adaptability and anti-attacking.Its design and optimization flow is used to analyze the applications to get the bottleneck operations,and the corresponding processing units are designed to accelerate the specific applications.The new designed units are easy to be added to the SDTA core,which helps to reduce the design time.
出处 《计算机工程》 CAS CSCD 北大核心 2011年第6期110-112,115,共4页 Computer Engineering
关键词 密码处理 同步数据触发结构 设计流程 异构多核 cipher processing Synchronous Data Triggered Architecture(SDTA) design flow heterogeneous multi-core
  • 相关文献

参考文献4

  • 1Spaanenburg H. Multi-core/Tile Polymorphous Computing Systems[C]//Proc. of the I st lnt'l Conf. on Information Technology. Gdansk, Poland:[s. n.], 2008.
  • 2Sankaralingam K, Nagarajan R. Distributed Microarchitectural Protocols in the TRIPS Prototype Processor[CJ//Proc. of the 39th Int'l Symposium on Microm'chitecture. Orlando, Florida, USA: [s. n.], 2006.
  • 3李淼,徐金甫,戴紫彬,杨晓辉.可重构散列函数密码芯片的设计与实现[J].计算机工程,2010,36(6):131-132. 被引量:6
  • 4Harrison O, Waldron J. AES Encryption Implementation and Analysis on Commodity Graphics Processing Units[C]//Proc. of the 9th Workshop on Cryptographie Hardware and Embedded Systems. Vienna, Austria: [s. n,], 2007.

二级参考文献6

  • 1曲英杰,刘卫东,战嘉瑾.可重构密码协处理器简介及其特性[J].计算机工程,2004,30(13):166-168. 被引量:7
  • 2Yang Xiaohui Dai Zibin Liu Yuanfeng Wang Ting.Researching and implementation of reconfigurable Hash chip based on FPGA[J].Journal of Systems Engineering and Electronics,2007,18(1):183-187. 被引量:3
  • 3Satoh A, lnoue T. ASIC-hardware-focused Comparison for Hash Functions MD5, RIPEMD-160, and SHS[C]//Proc. of ITCC'05. Las Vegas, Nevada, USA: [s. n], 2005.
  • 4National Institute of Standards and Technology. FIPS 180-Secure Hash Standard[Z]. 1993.
  • 5Diez J M. Hash Algorithms for Cryptographic Protocols: FPGA Imptementations[C]//Proc, of TELFOR'02. Belgrade, Yugoslavia: [s. n.], 2002: 26-28.
  • 6Altera Corporation. Stratix Ⅱ Architecture[Z]. (2004-09-22). http:// www.Altera.com.

共引文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部