Trivium hardware implementations for power reduction
نویسندگان
چکیده
منابع مشابه
Comparison of Low-Power Implementations of Trivium and Grain
This paper provides a comparison of the two stream cipher proposals Grain and Trivium which are candidates in the hardware focus phase of the eSTREAM project. We evaluate these algorithms concerning their feasibility to implement them for low-power applications in RFID systems. A triple of parameters which includes the chip area, the power consumption, and the number of clock cycles for encrypt...
متن کاملHardware Optimizations for Crypto Implementations
Latency, Area, and Power are three important metrics that a VLSI designer wants to optimize. However, often one of these may have to be optimized at the cost of another or the other two. Depending on the application scenario, choice of the metric to optimize is made. In this paper, we consider hardware implementations of a number of cryptographic primitives and present a number of optimizations...
متن کاملLow Power Implementation of Trivium Stream Cipher
This paper describes a low power hardware implementation of the Trivium stream cipher based on shift register parallelization techniques. The design was simulated with Modelsim, and synthesized with Synopsys in three CMOS technologies with different gate lengths: 180nm, 130nm and 90 nm. The aim of this paper is to evaluate the suitability of this technique and compare the power consumption and ...
متن کاملNew Techniques for Hardware Implementations of Sha
Secure Hash Algorithms are one of the forms of cryptographic algorithms. SHA hash functions are widely used security constructs. However, they are software implementations of SHA. This paper proposes techniques for hardware implementation of SHA. In order to provide security and improve performance, these methods are used in hardware reutilization and operation rescheduling. The purpose of impl...
متن کاملEfficient Hardware Implementations for the DES Family
Network data is, currently, often encrypted at a low level. In addition, as it is widely supported, the majority of future networks will use low-layer (IP level) encryption. Moreover, current trends imply that future networks are likely to be dominated by mobile terminals, thus, the power consumption and electromagnetic emissions aspects of encryption devices will be critical. This paper presen...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Circuit Theory and Applications
سال: 2016
ISSN: 0098-9886
DOI: 10.1002/cta.2281