A Memristive-Based Design of a Core Digital Circuit for Elliptic Curve Cryptography

被引:3
|
作者
Alammari, Khalid [1 ]
Ahmadi, Majid [1 ]
Ahmadi, Arash [2 ]
机构
[1] Univ Windsor, Dept Elect & Comp Engn, 401 Sunset Ave, Windsor, ON N9B 3P4, Canada
[2] Carleton Univ, Dept Elect, 1125 Colonel By Dr, Ottawa, ON K1S 5B6, Canada
关键词
Memristor; memristor ratioed logic; CMOS technology; memristance; logic gate Design; XAX-; module; FUTURE; LOGIC;
D O I
10.1142/S0218126623502596
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The new emerging non-volatile memory (NVM) devices known as memristors could be the promising candidate for future digital architecture, owing to their nanoscale size and its ability to integrate with the existing CMOS technology. The device has involved in various applications from memory design to analog and digital circuit design. In this paper, a combination of memristor devices and CMOS transistors is working together to form a hybrid CMOS-memristor circuit for XAX- Module, a core element used as digital circuit for elliptic curve cryptography. The proposed design was implemented using Pt/TaOx/Ta memristor device and simulated in Cadence Virtuoso. The simulation results demonstrate the design functionality. The proposed module appears to be efficient in terms of layout area, delay and power consumption since the design utilizes the hybrid CMOS/memristor gates.
引用
收藏
页数:11
相关论文
共 50 条
  • [41] A hybrid cryptography algorithm for data concentrator communication message based on elliptic curve cryptography
    Tong, Weiming
    Zhang, Xidong
    Li, Zhongwei
    Lin, Jingbo
    Dianli Xitong Zidonghua/Automation of Electric Power Systems, 2014, 38 (04): : 86 - 91
  • [42] A Systematic Way to Provide Security for Digital Signature Using Elliptic Curve Cryptography
    Randhawa, Navneet
    Singh, Lolita
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (07): : 154 - 158
  • [43] Design and Implementation of Unreliable CFDP Protocol over Elliptic Curve Cryptography
    Aswatha, A. R.
    Sasi, Smitha
    Santhosh, B.
    Mehta, Deval
    Babuprasad, Shweta
    SMART INTELLIGENT COMPUTING AND APPLICATIONS, VOL 2, 2020, 160 : 627 - 638
  • [44] Efficient Montgomery Multiplier for Pairing and Elliptic Curve Based Cryptography
    Javeed, Khalid
    Wang, Xiaojun
    2014 9TH INTERNATIONAL SYMPOSIUM ON COMMUNICATION SYSTEMS, NETWORKS & DIGITAL SIGNAL PROCESSING (CSNDSP), 2014, : 255 - 260
  • [45] Design and implementation of high-speed coprocessor for elliptic curve cryptography
    He D.-B.
    Chen J.-H.
    Hu J.
    Huanan Ligong Daxue Xuebao/Journal of South China University of Technology (Natural Science), 2010, 38 (05): : 90 - 94
  • [46] Design of Queue-Based Group Key Agreement Protocol Using Elliptic Curve Cryptography
    Jaiswal, Priyanka
    Kumar, Abhimanyu
    Tripathi, Sachin
    INFORMATION SYSTEMS DESIGN AND INTELLIGENT APPLICATIONS, VOL 1, 2015, 339 : 167 - 186
  • [47] A Roaming Authentication Protocol based on Elliptic Curve Cryptography in IOV
    Shen Cen
    Mu Haibing
    PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2017, : 400 - 404
  • [48] Protecting Author Royalty of Digital Assets Using Blockchain and Elliptic Curve Cryptography
    Ayasy, Muhammad Iqbal Syamil
    Barmawi, Ari Moesriami
    2022 INTERNATIONAL CONFERENCE ON GREEN ENERGY, COMPUTING AND SUSTAINABLE TECHNOLOGY (GECOST), 2022, : 86 - 92
  • [49] Efficient implementation of elliptic curve cryptography (ECC) for personal digital assistants (PDAs)
    Dabholkar, A
    Yow, KC
    WIRELESS PERSONAL COMMUNICATIONS, 2004, 29 (3-4) : 233 - 246
  • [50] A Lightweight RFID Authentication Protocol based on Elliptic Curve Cryptography
    Liu, Ya-Li
    Qin, Xiao-Lin
    Wang, Chao
    Li, Bo-Han
    JOURNAL OF COMPUTERS, 2013, 8 (11) : 2880 - 2887