Domain Specific High-Level Synthesis for Cryptographic WorkloadsBackground
Domain Specific High-Level Synthesis for Cryptographic Workloads: Background
Khalid, Ayesha; Paul, Goutam; Chattopadhyay, Anupam
2019-03-29 00:00:00
[The growth in the consumer market for digital devices goes hand in hand with the demand for enabling more comprehensive functionality, higher performance and lower power budgets from these devices. The mutually conflicting requirements of these increasingly complex systems, coupled with the continuous downscaling of fabrication technology [1], has welcomed the design trend of multi-component heterogeneous systems [2]. Security is one of the increasingly important application required for embedded devices. Unlike the provision/support of a service, security is considered critical enough to be taken now as a design metric for a system, along with other performance metrics such as cost, performance etc [3]. In keeping with the trend of heterogeneity of embedded systems, the computational burden for security applications is often isolated from the central computing resource of a system and levied instead on a separate computing entity dedicated to security applications [4]. Consequently, all major semiconductor IP core vendors offer security services IPs.]
http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.pnghttp://www.deepdyve.com/lp/springer-journals/domain-specific-high-level-synthesis-for-cryptographic-workloads-dwMr3DU0TE
Domain Specific High-Level Synthesis for Cryptographic WorkloadsBackground
[The growth in the consumer market for digital devices goes hand in hand with the demand for enabling more comprehensive functionality, higher performance and lower power budgets from these devices. The mutually conflicting requirements of these increasingly complex systems, coupled with the continuous downscaling of fabrication technology [1], has welcomed the design trend of multi-component heterogeneous systems [2]. Security is one of the increasingly important application required for embedded devices. Unlike the provision/support of a service, security is considered critical enough to be taken now as a design metric for a system, along with other performance metrics such as cost, performance etc [3]. In keeping with the trend of heterogeneity of embedded systems, the computational burden for security applications is often isolated from the central computing resource of a system and levied instead on a separate computing entity dedicated to security applications [4]. Consequently, all major semiconductor IP core vendors offer security services IPs.]
Published: Mar 29, 2019
Recommended Articles
Loading...
There are no references for this article.
Share the Full Text of this Article with up to 5 Colleagues for FREE
Sign up for your 14-Day Free Trial Now!
Read and print from thousands of top scholarly journals.
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.