Next:
Contents
Reconfigurable Cryptography
A Hardware Compiler for Cryptographic Applications
C. Scott Ananian
May 12, 1997
Contents
Introduction
Related Work
Methodology
Compiler
Front-end
Optimizer
Quadruples
Static Single-Assignment Form
Conditional Constant Propagation
Code motion
VHDL generation
Branch-compression
Loop handling
Hardware Design
Algorithm Selection
Benchmark designs
Results
Conclusions
Future Work
References
Tiger code
The TEA algorithm
The RC5 algorithm
VHDL code for brute-force attack on TEA
Data Types:
crypt_pack.vhdl
Driver chip:
driver.vhdl
Cryptographic Engine:
crypt.vhdl
C. Scott Ananian
10/11/1997