A Memristive-Based Design of a Core Digital Circuit for Elliptic Curve Cryptography

被引:3
|
作者
Alammari, Khalid [1 ]
Ahmadi, Majid [1 ]
Ahmadi, Arash [2 ]
机构
[1] Univ Windsor, Dept Elect & Comp Engn, 401 Sunset Ave, Windsor, ON N9B 3P4, Canada
[2] Carleton Univ, Dept Elect, 1125 Colonel By Dr, Ottawa, ON K1S 5B6, Canada
关键词
Memristor; memristor ratioed logic; CMOS technology; memristance; logic gate Design; XAX-; module; FUTURE; LOGIC;
D O I
10.1142/S0218126623502596
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The new emerging non-volatile memory (NVM) devices known as memristors could be the promising candidate for future digital architecture, owing to their nanoscale size and its ability to integrate with the existing CMOS technology. The device has involved in various applications from memory design to analog and digital circuit design. In this paper, a combination of memristor devices and CMOS transistors is working together to form a hybrid CMOS-memristor circuit for XAX- Module, a core element used as digital circuit for elliptic curve cryptography. The proposed design was implemented using Pt/TaOx/Ta memristor device and simulated in Cadence Virtuoso. The simulation results demonstrate the design functionality. The proposed module appears to be efficient in terms of layout area, delay and power consumption since the design utilizes the hybrid CMOS/memristor gates.
引用
收藏
页数:11
相关论文
共 50 条
  • [1] FPGA based design of elliptic curve cryptography coprocessor
    Wang You-Bo
    Dong Xiang-Jun
    Tian Zhi-Guang
    ICNC 2007: THIRD INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION, VOL 5, PROCEEDINGS, 2007, : 185 - +
  • [2] A Design of Certificate Authority Based on Elliptic Curve Cryptography
    Yuan Yangtao
    Liu Quan
    Li Fen
    PROCEEDINGS OF THE NINTH INTERNATIONAL SYMPOSIUM ON DISTRIBUTED COMPUTING AND APPLICATIONS TO BUSINESS, ENGINEERING AND SCIENCE (DCABES 2010), 2010, : 454 - 457
  • [3] Design of elliptic curve cryptography in GSI
    Zhu, YQ
    Lin, X
    Wang, G
    CURRENT TRENDS IN HIGH PERFORMANCE COMPUTING AND ITS APPLICATIONS, PROCEEDINGS, 2005, : 623 - 628
  • [4] PKI, elliptic curve cryptography, and digital signatures
    Caelli, William J.
    Dawson, Edward P.
    Rea, Scott A.
    Computers and Security, 1999, 18 (01): : 47 - 66
  • [5] PKI, elliptic curve cryptography, and digital signatures
    Caelli, WJ
    Dawson, EP
    Rea, SA
    COMPUTERS & SECURITY, 1999, 18 (01) : 47 - 66
  • [6] Design of a Private Credentials Scheme Based on Elliptic Curve Cryptography
    Athavale, Aditi
    Singh, Kuldip
    Sood, Sandeep
    2009 1ST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE, COMMUNICATION SYSTEMS AND NETWORKS(CICSYN 2009), 2009, : 332 - 335
  • [7] Design of an Efficient Elliptic Curve Cryptography Coprocessor
    MuthuKumar, B.
    Jeevananthan, Dr. S.
    FIRST INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING 2009 (ICAC 2009), 2009, : 34 - +
  • [8] Research on design of elliptic curve cryptography chip
    Wang Zhaoshun
    Shen Guicheng
    Zhang Ranlin
    Proceedings of 2006 International Conference on Artificial Intelligence: 50 YEARS' ACHIEVEMENTS, FUTURE DIRECTIONS AND SOCIAL IMPACTS, 2006, : 600 - 603
  • [9] Optimized design method on elliptic curve cryptography
    Cui, Xining
    Yang, Jingwei
    Ye, Hong
    Dai, Xiaodi
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2015, 42 (01): : 69 - 74
  • [10] Design of A New Memristive-Based Architecture Using VTM Method
    Mozafari, Farzad
    Ahmadi, Majid
    Ahmadi, Arash
    2022 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS 22), 2022, : 980 - 984