2009
DOI: 10.1109/tnano.2008.2011812
|View full text |Cite
|
Sign up to set email alerts
|

Efficient CMOL Gate Designs for Cryptography Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 29 publications
(17 citation statements)
references
References 8 publications
0
17
0
Order By: Relevance
“…An Evolutionary Optimization (EO) environment has been developed at UTK to configure the neural networks in a DANNA [1][2][3][4][5][6]. The EO trains over parameters of the network (weights and delay distances on synapses and thresholds on neurons) as well as the structure (the number and placement of neurons and synapses) and the dynamics of the network.…”
Section: Resultsmentioning
confidence: 99%
“…An Evolutionary Optimization (EO) environment has been developed at UTK to configure the neural networks in a DANNA [1][2][3][4][5][6]. The EO trains over parameters of the network (weights and delay distances on synapses and thresholds on neurons) as well as the structure (the number and placement of neurons and synapses) and the dynamics of the network.…”
Section: Resultsmentioning
confidence: 99%
“…The percentage of hardware resources utilized by this module may vary depending on how the S-box is implemented. If the S-box is implemented by combinational logic circuit, XOR gates become the dominant resources, which account for more than 70% of gate utilization for the AES implementation, as reported in [7]. • ShiftRows: The n th row of M s will be cyclically shifted to the left by n bytes.…”
Section: A Preliminary On Advanced Encryption Standardmentioning
confidence: 99%
“…The proposed DW-AES cipher is compared with both CMOS-based ASIC design [4], [6] and hybrid CMOS/ReRAM (CMOL) design [7]. In ASIC implementation, the performance data is extracted from the reported results in [4], [6] with the following technology scaling: Area ∼ 1/S 2 , Delay ∼ 1/S 2 , Energy ∼ 1/S, where S = L/32nm and leakage scaling factor from [36].…”
Section: Aes Performance Comparisonmentioning
confidence: 99%
See 2 more Smart Citations