期刊文献+

面向序列密码的抽取与插入单元可重构设计研究 被引量:9

Research on reconfigurable extract and insert units targeted at stream cipher algorithms
下载PDF
导出
摘要 研究了抽取与插入单元的基本原理,提出了一种可重构的抽取与插入硬件电路,并对核心模块控制信息生成电路进行了深入研究。可重构硬件电路通过配置能够灵活高效地实现32 bit、64 bit、128 bit、256 bit等位宽抽取与插入操作。该设计在Altera公司的FPGA上进行了功能验证,并在Synopsys公司的Design Compiler上进行了逻辑综合、优化。结果表明,在CMOS 0.13μm工艺下,可重构移位单元硬件架构核心频率可以达到350 MHz。 This paper presents a high-performance and flexible reconfigurable methodology for extract and insert units by studying the fundamental principle. The reconfigurable extract and insert units are designed to sustain variety data widths operations, such as 32 bit,64 bit,128 bit,256 bit. The design has been realized using Altera's FPGA and synthesized and optimized on Synopsy's Design Compiler .The result proves that the maximum frequency can achieve 350 MHz on 0.13 p,m CMOS technology.
出处 《电子技术应用》 北大核心 2011年第7期65-67,74,共4页 Application of Electronic Technique
关键词 抽取 插入 可重构 控制信息生成 extract insert reconfigurable control bits generation
  • 相关文献

参考文献2

二级参考文献22

  • 1周红,凌燮亭.有限精度混沌系统的m序列扰动实现[J].电子学报,1997,25(7):95-97. 被引量:99
  • 2[3]C E Shannon.A Mathematical Theory of Communication[J].Bell System Technical Journal,1948,27(4):379-423,623-656.
  • 3[4]C E Shannon.Communication theory of secrecy systems[J].Bell System Technical Journal,1949,28(4):656-715.
  • 4[7]Rueppel,R A.Good Stream Cipher Are Hard To Design[A].Proceedings of International Camahan Conference on Security Technology[C].1989.163-174.
  • 5[8]Fuster-Sabater.A family ofkeystream generator with large linear complexity[J].Applied Mathematics Letters,2004,17(6):739-740.
  • 6[9]Z D Dai.ProofofRueppel's Linear Complexity Conjecture[J].IEEE Transactions on Information Theory,1986,It-32(3):440-443.
  • 7[10]H Niederreiter.The Linear Complexity Profile and the Jump Complexity of Keystream Sequences[A].Advances in Cryptology EURO -CRYPT' 90 Proceedings[C].New York:Springer-Verlag,1991.174-188.
  • 8[11]S W Golomb.Shift Register Sequences[M].San Francisco:Holden-Day,1967.
  • 9[12]H Beker,F Piper.Cipher Systems:The Protection of Communications[M].London:Northwood Books,1982.
  • 10[13]R A Rueppel.Analysis and Design of Stream Ciphers[M].New York :Springer-Verlag,1986.

共引文献22

同被引文献61

  • 1刘运毅,覃团发,倪皖荪,张淑仪.简评ECRYPT的候选流密码算法(中)[J].信息安全与通信保密,2006,28(8):30-33. 被引量:2
  • 2刘运毅,覃团发,倪皖荪,张淑仪.简评ECRYPT的候选流密码算法(下)[J].信息安全与通信保密,2006,28(9):17-21. 被引量:7
  • 3金晨辉,郑浩然,张少武,等.密码学[M].北京:高等教育出版社,2009.
  • 4I Ruby B Lee, Shi Z J, Yin Y L. On Permutation Operations in Cipher Design[ C ]//Proceedings of the International conference on information technology (ITCC) ,2004.
  • 5Hilewitz Y, Shi Z J, Ruby B Lee. Comparing fast implementations of bit permutation instructions [ C ]//Proc. of IEEE Aslomar conference on Signals, Systems and Computers, Nov. 2004.
  • 6Hilewitz Y, Ruby B Lee. Fast bit gather, bit scatter and bit permuta- tion instructions for commodity microprocessors [ J ]. J. Signal Process- ing Systems, 2008, 53.
  • 7Hilewitz Y, Ruby B Lee. A new basis for shifter in general-purpose processors for exiting and advanced bit manipulations [ J 1. IEEE Transactions on computers, 2009,58.
  • 8Nan Longmei, Dai Zhibin. Design and Implementation of Configurabte Extract Instructions targeted at Stream Cipher Processing[C]//8th International Conference on ASIC, 2009.
  • 9Swartzlander Jr E E. A Review of Large Parallel Counter Designs [C]//IEEE Symposium on VLSI, Feb. 2004.
  • 10郑武,尹方,金纯.蓝牙加密算法及其VC++实现[J].计算机应用与软件,2007,24(11):207-209. 被引量:1

引证文献9

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部