Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

SYNCHRONOUS-TO-ASYNCHRONOUS CONVERSION OF CRYPTOGRAPHIC CIRCUITS

View through CrossRef
This paper introduces a novel method for the conversion of synchronous cryptographic circuits into equivalent asynchronous ones. The new method is based on ASERT (Asynchronous Scheduling by Edge Reversal Timing), a fully decentralized timing signaling and synchronization algorithm. From a synthesizable HDL code, an asynchronous timing network, made from standard cells libraries, is generated in order to replace the clock tree of the target circuit. ASERT works with matched delays, local clocks or any equivalent way of determining, statically or dynamically, the operating time of each functional unit. Synchronous to asynchronous conversion of three different cryptographic circuits, including the fully synthesized netlists of AES, Reed-Solomon decoder, and RSA cipher cores, are presented.
Title: SYNCHRONOUS-TO-ASYNCHRONOUS CONVERSION OF CRYPTOGRAPHIC CIRCUITS
Description:
This paper introduces a novel method for the conversion of synchronous cryptographic circuits into equivalent asynchronous ones.
The new method is based on ASERT (Asynchronous Scheduling by Edge Reversal Timing), a fully decentralized timing signaling and synchronization algorithm.
From a synthesizable HDL code, an asynchronous timing network, made from standard cells libraries, is generated in order to replace the clock tree of the target circuit.
ASERT works with matched delays, local clocks or any equivalent way of determining, statically or dynamically, the operating time of each functional unit.
Synchronous to asynchronous conversion of three different cryptographic circuits, including the fully synthesized netlists of AES, Reed-Solomon decoder, and RSA cipher cores, are presented.

Related Results

Survival between synchronous and non-synchronous multiple primary cutaneous melanomas—a SEER database analysis
Survival between synchronous and non-synchronous multiple primary cutaneous melanomas—a SEER database analysis
Background There is no criterion to distinguish synchronous and non-synchronous multiple primary cutaneous melanomas (MPMs). This study aimed to distinguish synchronous and non-syn...
POLYCHRONY for System Design
POLYCHRONY for System Design
Rising complexities and performances of integrated circuits and systems, shortening time-to-market demands for electronic equipments, growing installed bases of intellectual proper...
Fitness-evaluated Adaptive Switching Simulated Kalman Filter Algorithm with Randomness
Fitness-evaluated Adaptive Switching Simulated Kalman Filter Algorithm with Randomness
The original Simulated Kalman Filter (SKF) is an optimizer that employs synchronous update mechanism. The agents in SKF update their solutions after all fitness calculations, predi...
Self-Locking Domino Logic Pipelines: Application in RISC-V Architectures in FPGA
Self-Locking Domino Logic Pipelines: Application in RISC-V Architectures in FPGA
This paper presents the design and implementation of a self-locking domino logic pipeline controller for a RISC-V processor implemented on an FPGA. The emphasis is on asynchronous ...
A comprehensive review of post-quantum cryptography: Challenges and advances
A comprehensive review of post-quantum cryptography: Challenges and advances
One of the most crucial measures to maintain data security is the use of cryptography schemes and digital signatures built upon cryptographic algorithms. The resistance of cryptogr...

Back to Top