• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Fang Yuejian, Shen Qingni, Wu Zhonghai. A Parallel Architecture for FPGA Based Hyperelliptic Curve Cryptoprocessor[J]. Journal of Computer Research and Development, 2013, 50(11): 2383-2388.
Citation: Fang Yuejian, Shen Qingni, Wu Zhonghai. A Parallel Architecture for FPGA Based Hyperelliptic Curve Cryptoprocessor[J]. Journal of Computer Research and Development, 2013, 50(11): 2383-2388.

A Parallel Architecture for FPGA Based Hyperelliptic Curve Cryptoprocessor

More Information
  • Published Date: November 14, 2013
  • Hyperelliptic curve is an extension of elliptic curve cryptography. Shorter key lengths of hyperellitic curve cryptosystems (HECC) can be used to achieve same level of security comparing to RSA and elliptic curve cryptosystem (ECC). A parallel architecture for field programmable gate array (FPGA) based hyperelliptic curve cryptoprocessor is designed in this paper. The processor is composed of parallel finite field (FF) cores, and each core consists of a control unit, a register file and an ALU. Through sharing mechanism of register files, the independent cores can collaborate to fulfill complicated computations. Each ALU can execute customized instruction A(B+C)+D, and the instruction can be flexibly configured in the instruction generation and execution process. In our architecture, since every ALU is coupled with a control unit and a ROM, the ALUs are independent of each other. Any ALU can be started at any cycle, so multiple instructions can run on ALUs at the same time. The results of ALUs can be shared among the register files, so multiple ALUs can cooperate to finish complicated computations. A four stage pipeline is used to increase performance. The architecture designed can sufficiently support parallel processing and much higher speed up has been gained with the experiment results.
  • Related Articles

    [1]Xia Sibo, Ma Minghua, Jin Pengxiang, Cui Liyue, Zhang Shenglin, Jin Wa, Sun Yongqian, Pei Dan. Response Time Anomaly Diagnosis for Search Service[J]. Journal of Computer Research and Development, 2024, 61(6): 1573-1584. DOI: 10.7544/issn1000-1239.202330054
    [2]Ma Jun, Guo Yuanbo, Ma Jianfeng, Zhang Qi. A Time-Bound Hierarchical Access Control Scheme for Ubiquitous Sensing Network[J]. Journal of Computer Research and Development, 2017, 54(2): 328-337. DOI: 10.7544/issn1000-1239.2017.20150925
    [3]Jiang Junqiang, Lin Yaping, Xie Guoqi, Zhang Shiwen. Energy Optimization Heuristic for Deadline-Constrained Workflows in Heterogeneous Distributed Systems[J]. Journal of Computer Research and Development, 2016, 53(7): 1503-1516. DOI: 10.7544/issn1000-1239.2016.20160137
    [4]Wu Libing, Dang Ping, Nie Lei, He Yanxiang, Li Fei. A Fragmentable Admission Control Algorithm for Resource Reservation[J]. Journal of Computer Research and Development, 2014, 51(6): 1199-1205.
    [5]Zhou Hang, Huang Zhiqiu, Zhu Yi, Xia Liang, Liu Linyuan. Real-Time Systems Contact Checking and Resolution Based on Time Petri Net[J]. Journal of Computer Research and Development, 2012, 49(2): 413-420.
    [6]Zhou Hang, Huang Zhiqiu, Hu Jun, Zhu Yi. Real-Time System Resource Conflict Checking Based on Time Petri Nets[J]. Journal of Computer Research and Development, 2009, 46(9): 1578-1585.
    [7]Jiang Ying, Meng Dan. Enforcing Admission Control Using Admission-Time-Ratio and PI Controller[J]. Journal of Computer Research and Development, 2007, 44(1): 65-70.
    [8]Li Zhong, Wang Gang, and Liu Jing. A Statistical Admission Control Algorithm for Storage Systems with Mixed Multimedia Workloads[J]. Journal of Computer Research and Development, 2006, 43(3): 563-570.
    [9]Li Zhendong and Xie Li. Research on Ensuring QoS and Its Admission Control in Web Servers[J]. Journal of Computer Research and Development, 2005, 42(4): 662-668.
    [10]Xiao Hui and Hi Yunfa. Data Mining Based on Segmented Time Warping Distance in Time Series Database[J]. Journal of Computer Research and Development, 2005, 42(1): 72-78.

Catalog

    Article views (891) PDF downloads (627) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return