作者
Junfeng Fan, Kazuo Sakiyama, Ingrid Verbauwhede
发表日期
2008/9
期刊
Design Automation for Embedded Systems
卷号
12
页码范围
231-242
出版商
Springer US
简介
The increasing use of network-connected embedded devices and online transactions creates a growing demand of network security for embedded systems. The security requirements, such as authentication, confidentiality and integrity, always make computationally intensive processes and can easily become the bottleneck of the related applications. In this paper we implement Elliptic Curve Cryptography (ECC) (Miller in Lecture Notes in Computer Science, vol. 218, pp. 417–426, 1985; Koblitz in Math. Comput. 48:203–209, 1987) on an embedded multicore system, and explore the task scheduling methods in different levels. First, we propose an instruction scheduling method that utilizes all the cores to perform one modular operation in parallel. Second, we perform multiple modular operations with multiple cores in parallel. The performance of those two implementations is compared and a scheduling …
引用总数
200720082009201020112012201320142015201620172018201920202021202220232024132334331435432231
学术搜索中的文章
J Fan, K Sakiyama, I Verbauwhede - Design Automation for Embedded Systems, 2008