Subthreshold SRAM Designs for Cryptography Security Computations

نویسنده

  • Adnan Abdul-Aziz Gutub
چکیده

Cryptography and Security hardware designing is in continues need for efficient power utilization which is previously achieved by giving a range of trade-off between speed and power consumption. This paper presents the idea of considering subthreshold SRAM memory modules to gain ultra-low-power capable systems. The paper proposes modifying available crypto security hardware architectures to reconfigurable domain-specific SRAM memory designs. Although reliability is still a problem, we focus on the idea to design flexible crypto hardware to gain the speed as well as the reduced power consumption.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A 135mV 0.13μW process tolerant 6T subthreshold DTMOS SRAM in 90nm technology

A 135mV 0.13W process tolerant 6T subthreshold DTMOS SRAM in 90nm technology" Abstract Cell stability and tolerance to process variation are of primary importance in subthreshold SRAMs. We propose a DTMOS based 6T SRAM suitable for subthreshold operation. For variation tolerant memory peripheral circuitry, we apply β-ratio modulation technique. DTMOS SRAM array fabricated in 90nm technology ope...

متن کامل

Novel Subthreshold and Gate Leakage Reduction Techniques for 6T-SRAM Cell

Power has been an important issue for the present day microelectronic circuits of Soc designs. In the entire phase of design controlling power and dealing with power dissipation is very important. There are six leakage components in a MOS transistor. About 50 % of the total power consumption is through leakage components alone. Out of this 40 % power dissipation is through transistors.Out of th...

متن کامل

Towards Electrical, Integrated Implementations of SIMPL Systems

This paper discusses strategies for the electrical, integrated implementation of a novel security tool termed SIMPL system, which was introduced in [1]. SIMPL systems are a public key version of Physical Unclonable Functions (PUFs). Like a PUF, each SIMPL system S is physically unique and nonreproducible, and implements an individual function FS . In opposition to a PUF, every SIMPL system S po...

متن کامل

An integrated radix-4 modular divider/multiplier hardware architecture for cryptographic applications

The increasing importance of security in computers and communication systems introduces the need for several public-key cryptosystems. The modular division and multiplication arithmetic operations in GF (p) and GF (2 n ) are extensively used in many public key cryptosystems, such as El-Gamal cryptosystem, Elliptic Curve Cryptography (ECC), and the Elliptic Curve Digital Signature Algorithm (ECD...

متن کامل

Efficient Energy Recovery in 9T Adiabatic SRAM Cell Using Body Bias

Power dissipation is one of the major concerns of Very Large Scale Integration (VLSI) circuit designs. Leakage power is becoming the dominant power component in deep submicron technology. In this work a new 9T adiabatic SRAM is presented. The elementary cell structure of adiabatic SRAM consists of two high load resistors which are constructed of PMOS, a cross-coupled NMOS pair, NMOS switch whic...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011