A Memristive-Based Design of a Core Digital Circuit for Elliptic Curve Cryptography

被引:3
|
作者
Alammari, Khalid [1 ]
Ahmadi, Majid [1 ]
Ahmadi, Arash [2 ]
机构
[1] Univ Windsor, Dept Elect & Comp Engn, 401 Sunset Ave, Windsor, ON N9B 3P4, Canada
[2] Carleton Univ, Dept Elect, 1125 Colonel By Dr, Ottawa, ON K1S 5B6, Canada
关键词
Memristor; memristor ratioed logic; CMOS technology; memristance; logic gate Design; XAX-; module; FUTURE; LOGIC;
D O I
10.1142/S0218126623502596
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The new emerging non-volatile memory (NVM) devices known as memristors could be the promising candidate for future digital architecture, owing to their nanoscale size and its ability to integrate with the existing CMOS technology. The device has involved in various applications from memory design to analog and digital circuit design. In this paper, a combination of memristor devices and CMOS transistors is working together to form a hybrid CMOS-memristor circuit for XAX- Module, a core element used as digital circuit for elliptic curve cryptography. The proposed design was implemented using Pt/TaOx/Ta memristor device and simulated in Cadence Virtuoso. The simulation results demonstrate the design functionality. The proposed module appears to be efficient in terms of layout area, delay and power consumption since the design utilizes the hybrid CMOS/memristor gates.
引用
收藏
页数:11
相关论文
共 50 条
  • [21] Elliptic Curve Cryptography Point Multiplication Core for Hardware Security Module
    Mehrabi, Mohamad Ali
    Doche, Christophe
    Jolfaei, Alireza
    IEEE TRANSACTIONS ON COMPUTERS, 2020, 69 (11) : 1707 - 1718
  • [22] Novel Approach Design of Elliptic curve Cryptography Implementation in VLSI
    Chandrasekaran, V.
    Nagarajan, N.
    RECENT ADVANCES IN NETWORKING, VLSI AND SIGNAL PROCESSING, 2010, : 99 - +
  • [23] Elliptic curve cryptography based wireless authentication protocol
    Yongliang, Liu
    Gao, Wen
    Yao, Hongxun
    Yu, Xinghua
    International Journal of Network Security, 2007, 5 (03) : 327 - 337
  • [24] Deniable authentication protocol based on elliptic curve cryptography
    Hwang, MS
    Sung, PC
    Tzeng, SF
    7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING, 2003, : 65 - 67
  • [25] A novel elliptic curve cryptography processor using noc design
    Javashi, Hamid
    Sabbaghi-Nadooshan, Reza
    International Journal of Computer Science Issues, 2011, 8 (3 3-2): : 376 - 381
  • [26] Tradeoff analysis of FPGA based elliptic curve cryptography
    Bednara, M
    Daldrup, M
    Teich, J
    zur Gathen, JV
    Shokrollahi, J
    2002 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOL V, PROCEEDINGS, 2002, : 797 - 800
  • [27] Design of an Elliptic Curve Cryptography Processor for RFID Tag Chips
    Liu, Zilong
    Liu, Dongsheng
    Zou, Xuecheng
    Lin, Hui
    Cheng, Jian
    SENSORS, 2014, 14 (10): : 17883 - 17904
  • [28] COMPARATIVE ANALYSIS OF ELLIPTIC CURVE AND LATTICE BASED CRYPTOGRAPHY
    Davenport, Amanda
    Shetty, Sachin
    PROCEEDINGS OF THE 2021 ANNUAL MODELING AND SIMULATION CONFERENCE (ANNSIM'21), 2020,
  • [29] ASIP for Elliptic Curve Cryptography Based on VLIW Architecture
    Yang Xiaohui
    Dai Zibin
    Zhang Jun
    Zhang Yongfu
    CHINA COMMUNICATIONS, 2010, 7 (04) : 161 - 166
  • [30] Digital Content Security by Butterfly and Elliptic Curve Cryptography with Channel Optimization
    Pandey, Kartikey
    Sharma, Deepmala
    INTERNATIONAL JOURNAL OF MATHEMATICAL ENGINEERING AND MANAGEMENT SCIENCES, 2025, 10 (01) : 76 - 91