Software-Pipelined Academy, Research Institute, and Agency on a 64-Bit Superscalar Processor for High Performance

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 766
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorLee, Gieilko
dc.contributor.authorKim, Soontaeko
dc.contributor.authorLee, Jooheungko
dc.date.accessioned2014-08-26T08:40:05Z-
dc.date.available2014-08-26T08:40:05Z-
dc.date.created2013-11-11-
dc.date.created2013-11-11-
dc.date.issued2013-09-
dc.identifier.citationSENSOR LETTERS, v.11, no.9, pp.1804 - 1813-
dc.identifier.issn1546-198X-
dc.identifier.urihttp://hdl.handle.net/10203/187162-
dc.description.abstractFor secure computing against malicious attacks, symmetric security algorithms are commonly deployed on high-performance embedded systems such as network routers, database servers, UTM systems, etc. Consequently, high-performance security algorithms are critical in order not to degrade overall performance of those systems. We aim at optimizing ARIA, a Korean symmetric block cipher similar to AES, used on those embedded systems for high performance. For this end, we propose three low-level techniques for improving performance of ARIA at the software level. First, we utilize a 64-bit processing capability of current high-performance processors in order to reduce the number of instructions required to implement ARIA. Second, we make an attempt to maximize utilization of hardware resources so as to enhance the instruction-level parallelism. Third, low-level optimization techniques are applied to reduce instructions and instruction dependencies. By combining all the three techniques, we are able to improve the ARIA performance up to 47 percent over a compiler-generated optimal code.-
dc.languageEnglish-
dc.publisherAMER SCIENTIFIC PUBLISHERS-
dc.subjectTHROUGHPUT TRADE-OFFS-
dc.subjectBITSLICE IMPLEMENTATION-
dc.subjectAES-
dc.subjectARCHITECTURES-
dc.subjectARIA-
dc.titleSoftware-Pipelined Academy, Research Institute, and Agency on a 64-Bit Superscalar Processor for High Performance-
dc.typeArticle-
dc.identifier.wosid000331929600038-
dc.identifier.scopusid2-s2.0-84893500157-
dc.type.rimsART-
dc.citation.volume11-
dc.citation.issue9-
dc.citation.beginningpage1804-
dc.citation.endingpage1813-
dc.citation.publicationnameSENSOR LETTERS-
dc.identifier.doi10.1166/sl.2013.3005-
dc.contributor.localauthorKim, Soontae-
dc.contributor.nonIdAuthorLee, Gieil-
dc.contributor.nonIdAuthorLee, Jooheung-
dc.type.journalArticleArticle-
dc.subject.keywordPlusTHROUGHPUT TRADE-OFFS-
dc.subject.keywordPlusBITSLICE IMPLEMENTATION-
dc.subject.keywordPlusAES-
dc.subject.keywordPlusARCHITECTURES-
dc.subject.keywordPlusARIA-
Appears in Collection
CS-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0