An Analysis Framework for Hardware and Software Implementations with Applications from Cryptography

03/30/2019
by   Issam Damaj, et al.
0

With the richness of present-day hardware architectures, tightening the synergy between hardware and software has attracted a great attention. The interest in unified approaches paved the way for newborn frameworks that target hardware and software co-design. This paper confirms that a unified statistical framework can successfully classify algorithms based on a combination of the heterogeneous characteristics of their hardware and software implementations. The proposed framework produces customizable indicators for any hybridization of processing systems and can be contextualized for any area of application. The framework is used to develop the Lightness Indicator System (LIS) as a case-study that targets a set of cryptographic algorithms that are known in the literature to be tiny and light. The LIS targets state-of-the-art multi-core processors and high-end Field Programmable Gate Arrays (FPGAs). The presented work includes a generic benchmark model that aids the clear presentation of the framework and extensive performance analysis and evaluation.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/09/2019

Parallel Hardware for Faster Morphological Analysis

Morphological analysis in the Arabic language is computationally intensi...
research
10/20/2017

A software framework for pipelined arithmetic algorithms in field programmable gate arrays

Pipelined algorithms implemented in field programmable gate arrays are b...
research
02/15/2020

High-speed KATAN Ciphers on-a-Chip

Security in embedded systems has become a main requirement in modern ele...
research
04/07/2019

Parallel Algorithms Development for Programmable Devices with Application from Cryptography

Reconfigurable devices, such as Field Programmable Gate Arrays (FPGAs), ...
research
11/29/2021

Hardware Software Co-design framework for Data Encryption in Image Processing Systems for the Internet of Things Environmen

Data protection is a severe constraint in the heterogeneous IoT era. Thi...
research
10/19/2017

A Survey on Hardware Implementations of Elliptic Curve Cryptosystems

In the past two decades, Elliptic Curve Cryptography (ECC) have become i...
research
12/27/2012

A brief experience on journey through hardware developments for image processing and its applications on Cryptography

The importance of embedded applications on image and video processing,co...

Please sign up or login with your details

Forgot password? Click here to reset