Structural Analysis of RF Architecture using Crossbar Type Topology for Cryptographic Application
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 4
Abstract
Abstract: The strongly emerging class, Coarse-Grained Re-configurable Architecture (CGRA) is currently receiving attention and also having excellent performance with flexibility in fabrication. An entire range of components are now being offered as choices for system building blocks. The Reconfigurable fabric (RF) will be offered as an important building block for complex system design, CGRA processor. This paper gives an innovative design of reconfigurable fabric (RF) to achieve parallel processing techniques. Cryptographic hash function is a hash function which is considered practically impossible to invert, that is, to recreate the input data from its hash value alone. RF contains set of processing elements (PE) with crossbar type of arrangement for single dimensional processing of encryption technique to achieve reconfigurability. This implemented reconfigurable architecture design is evaluated by analyzing area, power, processing speed(delay to process) and area on various FPGAs using Xilinx 13.4.
Authors and Affiliations
Manisha Khorgade, Pravin Dakhole1,
Hadoop add-on API for Advanced Content Based Search & Retrieval
Abstract:Unstructured data like doc, pdf is lengthy to search and filter for desired information. We need to go through every file manually for finding information. It is very time consuming and frustrating. We can use f...
Fuzzy mathematical models for the analysis of fuzzy systems with application to liver disorders
Abstract: The main objective of this model is to focus on how to use the model of fuzzy system to solve fuzzy mathematics problems. Some mathematical models based on fuzzy set theory, fuzzy systems and neural netwo...
Design of Smart Universal Remote using Mobile for Home Automation
Abstract: Controlling Home Appliances remotely is à main part of automation. There is a great deal of inconvenience in controlling each digital home appliance with its own separate remote. In this paper we present...
Performance and Evaluation of Data Mining Techniques in Cancer Diagnosis
We analyze the breast Cancer data available from the WBC, WDBC from UCI machine learning with the aim of developing accurate prediction models for breast cancer using data mining techniques. Data mining has...
Mutual Trust to Provide Data Security in Cloud Environment
Abstract: We introduce a model for provable data possession (PDP) that allows a client that has stored data at an untrusted server to verify that the server possesses the original data without retrieving it. The mo...