Advanced Search
Volume 31 Issue 2
Dec.  2010
Turn off MathJax
Article Contents
Ai Ming-shun, Ma Hong-guang, Liu Gang. DOA Estimation Algorithm Base on Analytical Solution of Noise Subspace[J]. Journal of Electronics & Information Technology, 2010, 32(5): 1071-1076. doi: 10.3724/SP.J.1146.2009.00513
Citation: Meng Tao, Dai Zi-bin. Reconfigurable Clustered Architecture of Block Cipher Processor[J]. Journal of Electronics & Information Technology, 2009, 31(2): 453-456. doi: 10.3724/SP.J.1146.2007.01586

Reconfigurable Clustered Architecture of Block Cipher Processor

doi: 10.3724/SP.J.1146.2007.01586
  • Received Date: 2007-09-29
  • Rev Recd Date: 2008-04-07
  • Publish Date: 2009-02-19
  • This paper presents the reconfigurable clustered architecture of block cipher processor. Appointed by instructions, the data-path of this architecture can be dynamically configured to be three modes, which includes 4clusters, 2clusters and single cluster mode. In different mode, different operations can be done, which improves the flexibility of this processor. Basing on clustered architecture, Explicit-decomposition low-power-design method is presented, which can reduce the power by 36.1%. With 5stages pipeline and wave-pipeline, this processor can work in a high rate. And the performances of AES/DES/IDEA reach 689.6Mbit/s, 400Mbit/s, 416.7Mbit/s.
  • Abnous A and Bagherzadeh N. Pipelining and bypassing in aVLIW Processor [J].IEEE Trans. on Parallel and DistributedSystems.1994, 5(6):658-664[2]Kessler R E. The alpha 21264 microprocessor [J].IEEE Micro.1999, 19(2):24-36[3]Ebeling C, Cronquist D C, and Franklin P. RAPIDReconfigurablePipelined Datapath[C]. The 6th InternationalWorkshop on Field Programmable Logic and Applications,Darmstadt, Germany, Sep. 23-25, 1996: 126-135.[4]Goldstein S C, Schmit H, and Budiu M, et al.. PipeRench: Areconfigurable architecture and compiler [J]. Computer, 2000,33(4): 70-77.[5]Tseng J H and Asanovic K. A speculative control scheme foran energy-efficient banked register file [J].IEEE Trans. onComputers.2005, 54(6):741-751[6]Seznec A, Toullec E, and Rochecouste O. Register writespecialization register read specialization: A path tocomplexity-effective wide-issue superscalar processors [C].The 35th Annual IEEE/ACM International Symposium onMicroarchitecture, Istanbul, Turkey, Nov. 18-22, 2002:383-394.[7]杨晓辉. 面向分组密码处理的可重构设计技术研究[D]. [硕士论文], 解放军信息工程大学, 2007.[8]向楠. 比特置换网络及其在密码处理器中的应用研究[D]. [硕士论文], 解放军信息工程大学, 2007.[9]Yu Xue-rong. Design and implementation of reconfigurableshift unit using FPGAs [C]. The 1st InternationalSymposium on Pervasive Computing and ApplicationsProceedings. Urumchi, Xingjiang, China, August. 3-5, 2006:543-545.[10]Lee Ming Hung, Hwang TingTing, and Huang Shi-yu.Decomposition of extended finite state machine for low powerdesign [C]. The Design, Automation and Test in EuropeConference and Exhibition, Messe Munich, Mar.3-7, 2003:1152-1153.[11]Kuo Wu-An, Hwang TingTing, and Wu A C-H.Decomposition of instruction decoder for low power design[C]. The Design, Automation and Test in Europe Conferenceand Exhibition, CNIT La Defese, Pairs, France, Feb.16-20,2004, Vol.1: 664-665.[12]Hu Chi-Wei and Hwang TingTing. Output-pattern directeddecomposition for low power design [C]. The Design,Automation and Test in Europe Conference and Exhibition,CNIT La Defese, Pairs, France, Feb.16-20, 2004, vol.5:137-140.[13]Elbirt A J. Reconfigurable computing for symmetric-keyalgorithms [D]. [Doctor thesis], Massachusetts: Electrical andComputer Engineering Department University ofMassachusetts Lowell, 2002.曲英杰. 可重组密码逻辑的设计原理[D]. [博士论文], 北京科技大学, 2002.[14]Wu Lisa, Weaver C, and Austin T. CryptoManiac: A fastflexible architecture for secure communication [C]. The 28thAnnual International Symposium on Computer Architecture,Goteborg, Sweden, Jun.30-July4, 2001: l10-119.[15]Buchty R. CRYPTONITE: A programmable cryptoprocessor architecture for high- bandwidth applications [D].[Ph.D.dissertation], Munchen: Institut fur Informatik derTechnischen Universitat Munchen. 2002.
  • Cited by

    Periodical cited type(11)

    1. 王传宇,聂慧锋,王林,胡异炜,赵荣崎. 快速DOA估计算法研究. 舰船电子对抗. 2021(05): 82-85 .
    2. 曾小东. 基于ANSG的雷达信号DOA估计算法. 无线电工程. 2017(05): 32-36 .
    3. 王凌,李国林. 利用单次快拍实现相干信源二维测向的新算法. 北京理工大学学报. 2015(05): 512-518 .
    4. 刘付刚,郑爽. 一种新型窄带信号DOA估计算法. 弹箭与制导学报. 2014(01): 142-145 .
    5. 司伟建,吴迪,陈涛. 基于部分重合信号的空间谱估计新方法. 吉林大学学报(工学版). 2014(02): 490-496 .
    6. 艾名舜. 分段处理的反辐射被动导引抗有源诱偏策略. 太赫兹科学与电子信息学报. 2014(01): 52-56 .
    7. 娄利民,马秀荣,白媛. 基于自适应快拍数的DOA估计. 科学技术与工程. 2013(16): 4556-4561 .
    8. 闫锋刚,刘帅,金铭,乔晓林. 基于降维噪声子空间的二维阵列DOA估计算法. 电子与信息学报. 2012(04): 832-837 . 本站查看
    9. 王凌,李国林,隋鉴,邓兵. 单次快拍波达方向矩阵法. 系统工程与电子技术. 2012(07): 1323-1328 .
    10. 艾名舜,马红光. 基于网格爬山法的最大似然DOA估计算法. 信号处理. 2011(06): 890-895 .
    11. 常虹,赵国庆,石海杰,牛新亮. 基于多项式求根的欠采样频率估计方法. 宇航学报. 2011(01): 205-209 .

    Other cited types(5)

  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (3317) PDF downloads(935) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return