2023
DOI: 10.3390/electronics12204222
|View full text |Cite
|
Sign up to set email alerts
|

Design and Implementation of Low-Power IoT RISC-V Processor with Hybrid Encryption Accelerator

Sen Yang,
Lian Shao,
Junke Huang
et al.

Abstract: The security and reliability of data transmission between IoT devices are considered to be major challenges in the development of IoT technology. This paper presents a low-power, low-cost RISC-V processor for IoT applications with an integrated hybrid encryption accelerator, which can achieve efficient and secure encryption and decryption of data transmitted between IoT devices. The hybrid encryption accelerator, which uses the SM3 and the SM4, respectively, as hash and symmetric encryption algorithms, achieve… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 35 publications
(45 reference statements)
0
1
0
Order By: Relevance
“…The predominant catalyst for this increased attention is the energy-efficient operation characteristic of these networks, as highlighted in [ 10 ]. This aspect distinguishes SNNs from traditional low-power techniques, as documented in various studies [ 11 , 12 , 13 , 14 , 15 , 16 , 17 , 18 , 19 , 20 , 21 ]. SNN models are inherently reactive to event-based data, making them particularly apt for address-event representation-based computations, as explored in [ 22 ].…”
Section: Introductionmentioning
confidence: 99%
“…The predominant catalyst for this increased attention is the energy-efficient operation characteristic of these networks, as highlighted in [ 10 ]. This aspect distinguishes SNNs from traditional low-power techniques, as documented in various studies [ 11 , 12 , 13 , 14 , 15 , 16 , 17 , 18 , 19 , 20 , 21 ]. SNN models are inherently reactive to event-based data, making them particularly apt for address-event representation-based computations, as explored in [ 22 ].…”
Section: Introductionmentioning
confidence: 99%