簡易檢索 / 詳目顯示

研究生: 蘇持平
Chih-Pin Su
論文名稱: 密碼處理器之設計與測試
Design and Test of an Advanced Cryptographic Processor
指導教授: 吳誠文
Cheng-Wen Wu
口試委員:
學位類別: 博士
Doctor
系所名稱: 電機資訊學院 - 電機工程學系
Department of Electrical Engineering
論文出版年: 2004
畢業學年度: 92
語文別: 英文
論文頁數: 149
中文關鍵詞: 密碼學處理器安全性測試排程
外文關鍵詞: Cryptography, processor, security, test scheduling
相關次數: 點閱:2下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 隨著通訊技術的進步,利用網際網路或其他通訊設備來交換資料已深植在我們生活的每一個角落。網路資料的處理已成為電腦系統裡所需解決的問題,這一方面在過去是由一般的CPU來處理,而現在已發展成由專門的網路處理器(NPU)來提供高速的封包處理,以解決現今日亦嚴重的網路流量問題。網路與通訊安全在過去僅用於政府機關、軍事單位或私人機構,如今也隨著網際網路的發達而成為今後急需解決的問題,因此資訊加密的處理也跟著網路資料傳輸一樣,將會有越來越多的需求。
    在此篇論文中, 我們提出了一個具前瞻性的密碼處理器來加速一般CPU或網路處理器對加密資料的處理。由於加密演算法種類繁多,本設計採取模組化(core-based)的設計,將選定的加密演算法如AES、RSA、HMAC及RNG 加以實現為IP,並提出一個可調整的硬體架構將所有的IP整合成為一個密碼處理器。
    在AES演算法部分,我們提出了一個高效能低成本的電路設計方式,主要是採取Composite Field Arithmetic運算來實現演算法的核心Sbox部分,相對於查表(table-lookup)的設計方法,可節省較多的面積。對於加解密過程中所要用金鑰,我們也提出了一種可同步計算金鑰的電路,而不需使用額外的記憶體來儲存金鑰。基於對AES處理器的經驗,我們也實現了一個可調變的AES處理器,經由對AES演算法之參數的調整,可產生新的AES演算法,藉以進一步的提高系統的安全性。在我們提出的架構中可以利用較合理的面積來達到以上的要求,並可快速的做調變。其他如RSA、HMAC及RNG線路的實現則是由實驗室其他成員所貢獻。
    密碼處理器中所有的IP皆遵守AMBA AHB Slave傳輸協定,並使用AMBA AHB作為On-Chip Bus,我們設計了一個具有Descriptor-based DMA功能的模組來控制IP的運作,並自動完成資料的輸入與輸出。DMA中可程式化的channel與密碼處理器中的加密引擎是可以隨效能的需求而增減。整個處理器的測試方面,則是採用實驗室內部所開發完成的STEAC系統,來整合各個模組的測試方法,及產生相應的測試電路。
    最後在本篇論文中,我們對於模組化設計方式(core-based design methodology)在測試整合方面遇到的測試排程問題提出了一個解決方法,利用圖學理論的分析,我們的方法可以同時考慮各模組的測試相容性、測試通道的分配,來產生接近理想值的測試排程,同時也考慮到測試功率的問題。這個方法也在ITC’02 benchmark中表現出不錯的結果,並可以用來解決我們密碼處理器的測試整合問題上。


    With the rapid advance in communication technology, the use of networks and communication
    facilities for transmitting information between people, companies or countries has been implanted
    deeply in our real life. Network processing becomes an emerging problem that needs to be dealt
    with in the computer system. The ability to properly serve heavy traffic on internet through network
    equipments is now provided by a fast network processing chip. The security of communications,
    originally a problem of government, military or privileged organizations, becomes one of
    the major concerns among individuals and corporations. There is an increasing demand in network
    processing, including the security processing.

    This thesis describes the development of an advanced cryptographic processor (an analogous term
    is security processor, which is also used in the rest of the thesis). As a coprocessor of a CPU
    or a network processor (NPU), the cryptographic processor reduces the load of the host by providing
    the computing power of security processing. Due to the heterogeneous characteristic in
    cryptographic functions, our design is based on the core-based design methodology. The cryptographic
    functions have been specified first and implemented with crypto-engines. Base on these
    basic building blocks, a scalable architecture is provided to integrate these crypto-engines into a
    cryptographic processor.

    First, cryptographic functions such as AES, RSA, HMAC algorithms and Random Number Generation
    are selected to be the algorithms that our cryptographic processor supports. We propose a
    high-throughput low-cost AES processor design. The S-Box of the AES algorithm is implemented
    based on the composite field arithmetic. The area overhead can be greatly reduced compared with
    the table look-up method. The key expansion procedure is implemented by the proposed on-the-fly
    key generation hardware, which further removes the need of on-chip memory. This cost-effective
    implementationwill be used as a crypto-engine for our cryptographic processor later. Other cryptoengines,
    such as RSA, HMAC and RNG are contributed by oother members in our research group. Based on the experience on AES implementation, we also proposed a configurable AES processor
    for extended security requirement. The parameters within the round function of AES algorithm can
    be reconfigured on-line to become an extended AES cipher. Our architecture has relatively low area
    overhead and rapid reconfiguration capability. When embedded in a communication system, the
    security level can be further enhanced.
    In the second phase, each crypto-engine is wrapped with an AHB slave interface. With the help of
    an on-chip AHB, we develop a descriptor-based DMA module to integrate all the crypto-engines.
    The DMA-like interface makes our cryptographic processor capable of loading the data automatically,
    to be processed by specified crypto-engines, and transferring the result back to the system
    memory. The host processor only needs to generate proper descriptors for it. In our architecture,
    the number of channels in the DMA interface and the number of internal crypto-engines can be
    easily configured to fit in different systems. The SOC Test Aid Console (STEAC) is also employed
    to ease the test integration problem in our design.
    Finally, we propose a graph-based method to solve the power-constrained test scheduling problem,
    which is an important issue among test integration. The relationship between the test schedule
    of a core-based design and the test access mechanism (TAM) design is investigated by our graph
    model. We present a heuristic algorithm that can effectively assign TAM wire to each core, given
    the test order. With the help of tabu search and graph model, the proposed algorithm allows rapid
    exploration of the solution space. Experimental result for ITC02 benchmarks show that short
    test length is achieved within reasonable computing time. This method can also solve the test
    scheduling problem of our cryptographic processor.

    Contents 1 Introduction 2 1.1 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.2 CryptographicHardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 1.3 DissertationOrganization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 2 Overview of Cryptography 7 2.1 SecurityRequirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 2.2 SecurityAlgorithms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 2.2.1 Symmetric-KeyCryptography . . . . . . . . . . . . . . . . . . . . . . . . 9 2.2.2 Public-KeyCryptography . . . . . . . . . . . . . . . . . . . . . . . . . . 10 2.2.3 Hashing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 2.3 SecurityMechanism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 2.3.1 DigitalSignature . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 2.3.2 Key Agreement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 2.3.3 KeyManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 2.4 SecurityProtocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 2.4.1 SecuritySocketLayer (SSL) . . . . . . . . . . . . . . . . . . . . . . . . . 15 2.4.2 IPSecurity (IPSec) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 3 System Architecture of Security Processors 23 3.1 System Considerations in Security Processor . . . . . . . . . . . . . . . . . . . . . 23 3.2 Types of Security Processor Architecture . . . . . . . . . . . . . . . . . . . . . . . 25 3.2.1 Look-Aside Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 3.2.2 Flow-Through Architecture . . . . . . . . . . . . . . . . . . . . . . . . . 26 3.2.3 IntegratedArchitecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 3.3 Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 3.3.1 SafeNet SafeXcel-1842 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 3.3.2 Hifn HIPPP III 8300 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 3.3.3 Intel IXP2850 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 4 AES Processor Core 31 4.1 AESAlgorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 4.2 PreviousWorks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 4.3 AnEfficientS-BoxDesign . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 4.4 AESTHETIC: A Configurable AES Processor for Enhanced Security Requirement 41 4.4.1 Scope of Configurability . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 4.4.2 Design Consideration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 4.4.3 CompositeFieldArithmetic . . . . . . . . . . . . . . . . . . . . . . . . . 43 4.4.4 FieldConversion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 4.5 On-the-FlyKeyScheduler . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 4.6 ChipImplementationsandComparison . . . . . . . . . . . . . . . . . . . . . . . 49 4.6.1 Hardware Implementation of AES Processor . . . . . . . . . . . . . . . . 49 4.6.2 Hardware Implementation of AESTHETIC . . . . . . . . . . . . . . . . . 52 4.6.3 Results and Comparisons . . . . . . . . . . . . . . . . . . . . . . . . . . . 61 5 Cryptographic Processor 66 5.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66 5.1.1 HardwareArchitecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67 5.1.2 Descriptors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69 5.2 AddressMap . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 5.2.1 CryptoDMAControllerRegisters . . . . . . . . . . . . . . . . . . . . . . 76 5.2.2 ChannelRegisters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 5.3 Crypto-Engines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 5.3.1 AESEngine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 5.3.2 RSAEngine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87 5.3.3 HMACEngine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90 5.3.4 Random Number Generator . . . . . . . . . . . . . . . . . . . . . . . . . 92 5.4 Crypto-DMA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 5.4.1 TransferEngines andTransferArbiters . . . . . . . . . . . . . . . . . . . 100 5.4.2 Crypto-Channels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102 5.4.3 MainController . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106 5.5 ImplementationResults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108 5.6 Performance Estimation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111 6 Power-Constrained Test Scheduling for Core-Based Design 115 6.1 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115 6.2 Problem Definition and the Graph Model . . . . . . . . . . . . . . . . . . . . . . 117 6.2.1 CoreTestModel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118 6.2.2 Test Compatibility Graph . . . . . . . . . . . . . . . . . . . . . . . . . . . 119 6.3 TAMAssignmentAlgorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121 6.4 Modified Tabu Search . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127 6.5 ExperimentalResults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129 6.5.1 Test Scheduling without Power Constraint . . . . . . . . . . . . . . . . . . 130 6.5.2 Power-Constrained Test Scheduling . . . . . . . . . . . . . . . . . . . . . 136 7 Conclusions and Future Work 139

    [1] W. Stallings, Cryptography and Network Security: Principles and Practices. Upper Saddle
    River, NJ, 07458: Prentice-Hall Inc., 2003.
    [2] SafeNet, Inc., “SaftNet SafeXcel-1842 Product Brief,” 2003.
    [3] Hifn, Inc., “HIPP III FlowThrough Security Processor Product Brief,” 2003.
    [4] Intel, Inc., “Intel IXP2850 Network Processor Product Brief,” 2003.
    [5] National Institute of Standards and Technology (NIST), Advanced Encryption Standard
    (AES). Springfield, VA 22161: National Technical Information Service, Nov. 2001.
    [6] P. Fergguson and G. Huston, “What is a VPN?—Part I,” The Internet Protocol Journal, vol. 1,
    pp. 2–19, June 1998. http://www.cisco.com/warp/public/759/.
    [7] S. Kent and R. Atkinson, Security Architecture for the Internet Protocol. IETF Network
    Working Group, 1998. RFC 2401.
    [8] R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and
    public-key cryptosystems,” Communications of the ACM, vol. 21, pp. 120–126, Feb. 1978.
    [9] N. Koblitz, “Elliptic curve cryptosystems,” in Mathmatics of Computation, pp. 203–209,
    1987.
    [10] W. Diffie and M. E. Hellman, “New directions in cryptography,” IEEE Trans. Information
    Theory, vol. 22, pp. 644–654, Nov. 1976.
    [11] National Institute of Standards and Technology (NIST), Data Encryption Standard (DES).
    Springfield, VA 22161: National Technical Information Service, Oct. 1999.
    [12] National Institute of Standards and Technology (NIST), Secure Hash Standard (SHS). Spring-
    field, VA 22161: National Technical Information Service, Aug. 2002.
    [13] R. L. Rivest, “The MD5 message-digest algorithm.” RFC 1321, the Internet Society, Apr.
    1992.
    [14] P. L. Montgomery, “Modular multiplication without trial division,” Math. Computation,
    vol. 44, no. 7, pp. 519–521, 1985.
    [15] P.-S. Chen, S.-A. Hwang, and C.-W.Wu, “A systolic RSA public key cryptosystem,” in Proc.
    IEEE Int. Symp. Circuits and Systems (ISCAS), vol. 4, (Atlanta), pp. 408–411, May 1996.
    [16] C.-C. Yang, T.-S. Chang, and C.-W. Jen, “A new RSA cryptosystem hardware design based on
    Montgomery’s algorithm,” IEEE Trans. Circuits and Systems II: Analog and Digital Signal
    Processing, vol. 45, pp. 908–913, July 1998.
    [17] C.-Y. Su, S.-A. Hwang, P.-S. Chen, and C.-W. Wu, “An improved Montgomery algorithm for
    high-speed RSA public-key cryptosystem,” IEEE Trans. VLSI Systems, vol. 7, pp. 280–284,
    June 1999.
    [18] J.-H. Hong and C.-W. Wu, “A radix-4 cellular array modular multiplier based on Montgomery’s
    algorithm and Booth’s algorithm,” in Proc. 10th VLSI Design/CAD Symp., (Nantou),
    pp. 165–168, Aug. 1999.
    [19] C.-H. Wu, J.-H. Hong, and C.-W. Wu, “VLSI design of RSA cryptosystem based on the
    Chinese Remainder Theorem,” J. Inform. Science and Engineering, vol. 17, pp. 967–979,
    Nov. 2001.
    [20] Y.-C. Lin, “A word-based RSA public-key crypto-processor core for IC smart card,” master
    thesis, Dept. Electrical Engineering, National Tsing Hua University, Hsinchu, Taiwan, June
    2001.
    [21] A. F. Tenca, G. Todorov, and C¸ .K.Koc¸, “High-radix design of a scalable modular multiplier,”
    in Cryptographic Hardware and Embedded Systems (CHES) 2001 (C¸ . K. Koc¸, D. Naccache,
    and C. Paar, eds.), vol. 2162 of LNCS, pp. 189–205, Springer-Verlag, 2001.
    [22] M.-C. Sun, C.-P. Su, C.-T. Huang, and C.-W. Wu, “Design of a scalable RSA and ECC
    crypto-processor,” in Proc. Asia and South Pacific Design Automation Conf. (ASP-DAC),
    (Kitakyushu), pp. 495–498, Jan. 2003. (Best Paper Award).
    [23] E. Savas¸, A. F. Tenca, and C¸ .K. Koc¸, “A scalable and unified multiplier architecture for finite
    fields GF(p) and GF(2m),” in Cryptographic Hardware and Embedded Systems (CHES)
    2000, LNCS, pp. 281–296, Springer-Verlag, 2000.
    [24] J. Burke, J. McDonald, and T. Austin, “Architectural support for fast symmetric-key cryptography,”
    ACM SIGPLN Notices, vol. 35, pp. 178–189, Nov. 2000.
    [25] L. Wu, C. Weaver, and T. Austin, “CryptoManiac: A fast flexible architecture for secure
    communication,” in Proc. 28th Ann. Int. Symp. Computer Architecture, pp. 110–119, 2001.
    [26] C.-H. Wang, C.-P. Su, C.-T. Huang, and C.-W. Wu, “A word-based rsa crypto-processor
    with enhanced pipeline performance,” in Proc. 4th IEEE Asia-Pacific Conf. ASIC, (Fukuoka,
    Japan), Aug. 2004 (to appear).
    [27] M.-Y. Wang, C.-P. Su, C.-T. Huang, and C.-W. Wu, “An HMAC processor with integrated
    SHA-1 and MD5 algorithms,” in Proc. Asia and South Pacific Design Automation Conf.
    (ASP-DAC), (Yokohama), pp. 456–458, Jan. 2004.
    [28] C.-W. Wang, J.-R. Huang, K.-L. Cheng, H.-S. Hsu, C.-T. Huang, C.-W. Wu, and Y.-L. Lin,
    “A test access control and test integration system for system-on-chip,” in Sixth IEEE Int.
    Workshop on Testing Embedded Core-Based System-Chips (TECS), (Monterey, California),
    pp. P2.1–P2.8, May 2002.
    [29] A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography.
    Boca Raton, FL: CRC Press, Oct. 1996.
    [30] N. I. of Standards and T. (NIST), The Keyed-Hash Message Authentication Code (HMAC).
    Springfield, VA 22161: National Technical Information Service, Mar. 2002.
    [31] N. Cravotta, “Accelerating high-speed encryption: one bottleneck after another,” 2001.
    [32] W. Feghali, B. Burres, G. Wolrich, and D. Carrigan, “Security: Adding protection to the
    network via the network processor,” Intel Technology Journal, vol. 6, no. 3, pp. 40–49, 2002.
    [33] P. C. Lekkas, Network Processors: Architectures, Protocols, and Platforms. McGraw-Hill,
    2003.
    [34] E. Khan, M. W. El-Kharashi, A. N. M. E. Rafiq, F. Gebali, and M. Abd-El-Barr, “Network
    processors for communication security: A review,” in Proc. IEEE Pacific Rim Conf. Communications,
    Computers and Signal Processing, pp. 173–176, 2003.
    [35] V. R. J.Daemen, “The Block Cipher Rijndael,” in Smart Card Research and Application,
    vol. 1820 of LNCS, pp. 288–296, Springer-Verlag, 2000.
    [36] A. Dandalis, V. K. Prasanna, and J. D. P. Rolim, “A comparative study of performance of AES
    final candidates using FPGAs,” in Cryptographic Hardware and Embedded Systems (CHES)
    2000, vol. 1965 of LNCS, pp. 125–140, Springer-Verlag, Aug. 2000.
    [37] K. Gaj and P. Chodowiec, “Fast implementation and fair comparison of the final candidates
    for advanced encryption standard using field programmable gate arrays,” in Proc. RSA Security
    Conf., Cryptographer’s Track, vol. 2020 of LNCS, pp. 84–99, Springer-Verlag, Apr.
    2001.
    [38] S. McMillan and C. Patterson, “JBits implementations of the advanced encryption standard
    (Rijndael),” in Proc. 11th Int. Conf. Field-Programmable Logic and Applications (FPL),
    vol. 2147 of LNCS, pp. 162–171, Springer-Verlag, Aug. 2001.
    [39] P. Chodowiec, K. Gaj, P. Bellows, and B. Schott, “Experimental testing of the Gigabit IPSeccompliant
    implementations of Rijndael and triple DES using SLAAC-1V FPGA accelerator
    board,” in Proc. Information Security Conf. (ISC), vol. 2200 of LNCS, pp. 220–234, Springer-
    Verlag, Oct. 2001.
    [40] K. U. Jarvinen, M. T. Tommiska, and J. O. Skytta, “A fully pipelined memoryless 17.8 Gbps
    AES-128 encryptor,” in Proc. Int. Symp. Field-Programmable Gate Arrays (FPGA), (Monterey),
    pp. 207–215, ACM Press, 2003.
    [41] I. Verbauwhede, P. Schaumont, and H. Kuo, “Design and performance testing of a 2.29-GB/s
    Rijndael processor,” IEEE Journal of Solid-State Circuits, vol. 38, pp. 569–572, Mar. 2003.
    [42] V. Fischer and M. Drutarovsky, “Two methods of Rijndael implementation in reconfigurable
    hardware,” in Cryptographic Hardware and Embedded Systems (CHES) 2001, vol. 2162 of
    LNCS, pp. 77–92, Springer-Verlag, May 2001.
    [43] S. Morioka and A. Satoh, “A 10Gbps full-AES crypto design with a twisted-BDD S-Box architecture,”
    in Proc. IEEE Int. Conf. Computer Design (ICCD), (Freiburg, Germany), pp. 98–
    103, Sept. 2002.
    [44] U. Mayer, C. Oelsner, and T. Kohler, “Evaluation of different Rijndael implementations for
    high end servers,” in Proc. IEEE Int. Symp. Circuits and Systems (ISCAS), vol. 2, pp. 348–
    351, May 2002.
    [45] V. Rijmen, “Efficient implementation of the Rijndael S-box.”
    http://www.esat.kuleuven.ac.be/˜rijmen/rijndael/sbox.pdf.
    [46] A. Satoh, S. Morioka, K. Takano, and S. Munetoh, “A compact Rijndael hardware architecture
    with S-box optimization,” in ASIACRYPT 2001, vol. 2248 of LNCS, pp. 239–254,
    Springer-Verlag, 2001.
    [47] J. Wolkerstorfer, E. Oswald, and M. Lamberger, “An ASIC implementation of the AES
    SBoxes,” in CT-RSA 2002, vol. 2271 of LNCS, pp. 67–78, Springer-Verlag, 2002.
    [48] T.-F. Lin, C.-P. Su, C.-T. Huang, and C.-W. Wu, “A high-throughput low-cost AES cipher
    chip,” in Proc. 3rd IEEE Asia-Pacific Conf. ASIC, (Taipei), pp. 85–88, Aug. 2002.
    [49] S. Mangard, M. Aigner, and S. Dominikus, “A highly regular and scalable AES hardware
    architecture,” IEEE Trans. Computers, vol. 52, pp. 483–491, Apr. 2003.
    [50] S. Morioka and A. Satoh, “An optimized S-box circuit architecture for low power AES design,”
    in Cryptographic Hardware and Embedded Systems (CHES) 2002, vol. 2523 of LNCS,
    pp. 172–186, Springer-Verlag, 2002.
    [51] A. Satoh, S. Morioka, K. Takano, and S. Munetoh, “Unified hardware architecture for 128-
    bit block ciphers AES and Camellia,” in Cryptographic Hardware and Embedded Systems
    (CHES) 2003, Springer-Verlag, Aug. 2003.
    [52] H. Kuo and I. Verbauwhede, “Architectural optimization for a 1.82 Gbits/sec VLSI implementation
    of the AES Rijndael algorithm,” in Cryptographic Hardware and Embedded Systems
    (CHES) 2001 (C¸ . K. Koc¸, D. Naccache, and C. Paar, eds.), vol. 2162 of LNCS, Springer-
    Verlag, May 2001.
    [53] J. H. Shim, D.W. Kim, Y. K. Kang, T.W. Kwon, and J. R. Choi, “A Rijndael cryptoprocessor
    using shared on-the-fly key scheduler,” in Proc. 3rd IEEE Asia-Pacific Conf. ASIC, (Taipei),
    pp. 89–92, Aug. 2002.
    [54] C.-P. Su, T.-F. Lin, C.-T. Huang, and C.-W.Wu, “A high-throughput low-cost AES processor,”
    IEEE Communications Magazine, vol. 41, pp. 86–91, Dec. 2003.
    [55] C.-L. Horng and C.-W.Wu, “An aes cipher chip design using on-the-fly key scheduler,” Master’s
    thesis, National Tsing-Hua University, Electrical Engineering Department, June 2004.
    [56] W. W. Peterson and E. J. Weldon, Jr., Error-Correcting Codes. Cambridge, MA: MIT Press,
    2 ed., 1972.
    [57] C. Paar, “A new architecture for a parallel finite field multiplier with low complexity based
    on composite fields,” IEEE Trans. Computers, vol. 45, pp. 856–861, July 1996.
    [58] I. ARM Components, AMBA Specification Rev2.0, May 1999.
    [59] T. Ichikawa, T. Kasuya, and M. Matsui, “Hardware evaluation of the AES finalists,” in Proc.
    3rd AES Candidate Conference, 2000.
    [60] ARM components, Inc., “Multi-Layer AHB,” 2001.
    [61] IEEE, “IEEE P1500 standard for embedded core test (SECT).”
    http://grouper.ieee.org/groups/1500/, 2002.
    [62] IEEE, IEEE Standard Test Interface Language (STIL) for Digital Test Vector Data. Piscataway:
    IEEE Standards Department, Sept. 1999.
    [63] Y. Zorian, E. J. Marinissen, and S. Dey, “Testing embedded-core based system chips,” in
    Proc. Int. Test Conf. (ITC), pp. 130–143, Oct. 1998.
    [64] J. Aerts and E. J. Marinissen, “Scan chain design for test time reduction in core-based ICs,”
    in Proc. Int. Test Conf. (ITC), pp. 448–457, 1998.
    [65] V. Iyengar and K. Chakrabarty, “Precedence-based, preemptive, and power-constrained test
    scheduling for system-on-a-chip,” in Proc. IEEE VLSI Test Symp. (VTS), pp. 368–374, 2001.
    [66] R. M. Chou, K. K. Saluja, and V. D. Agrawal, “Scheduling tests for VLSI systems under
    power constraints,” IEEE Trans. VLSI Systems, vol. 5, pp. 175–185, June 1997.
    [67] K. Chakrabarty, “Test scheduling for core-based systems using mixed-integer linear programming,”
    IEEE Trans. Computer-Aided Design of Integrated Circuits and Systems, vol. 19,
    pp. 1163–1174, Oct. 2000.
    [68] K. Chakrabarty, “Design of system-on-a-chip test access architecture using integer linear
    programming,” in Proc. IEEE VLSI Test Symp. (VTS), pp. 127–134, 2000.
    [69] K. Chakrabarty, “Design of system-on-a-chip test access architecture under place-and-route
    and power constraints,” in Proc. IEEE/ACM Design Automation Conf. (DAC), pp. 432–437,
    2000.
    [70] V. Muresan, X. Wang, V. Muresan, and M. Vladutiu, “A comparison of classical scheduling
    approaches in power-constrained block-test scheduling,” in Proc. Int. Test Conf. (ITC),
    pp. 882–891, 2000.
    [71] V. Iyengar, K. Chakrabarty, and E. J. Marinissen, “Test wrapper and test access mechanism
    co-optimzation for system-on-chip,” in Proc. Int. Test Conf. (ITC), (Baltimore), pp. 1023–
    1032, Oct. 2001.
    [72] E. Larsson and Z. Peng, “An integrated system-on-chip test framework,” in Proc. Design,
    Automation and Test in Europe (DATE), (Munich), pp. 138–144, Mar. 2001.
    [73] V. Iyengar, K. Chakrabary, and E. J.Marinissen, “Efficient wrapper/TAMco-optimization for
    large SOCs,” in Proc. Design, Automation and Test in Europe (DATE), (Paris), pp. 491–498,
    Mar. 2002.
    [74] V. Iyengar, K. Chakrabarty, and E. J.Marinissen, “On using rectangle packing for SOC wrapper/
    TAM co-optimization,” in Proc. IEEE VLSI Test Symp. (VTS), (Monterey), pp. 253–258,
    Apr. 2002.
    [75] S. K. Goel and E. J. Marinissen, “Cluster-based test architecture design for system-on-chip,”
    in Proc. IEEE VLSI Test Symp. (VTS), (Monterey), pp. 259–264, Apr. 2002.
    [76] S. K. Goel and E. J. Marinissen, “Effective and efficient test architecture design for SOCs,”
    in Proc. Int. Test Conf. (ITC), (Baltimore), pp. 529–538, Oct. 2002.
    [77] Y. Huang, W.-T. Cheng, C.-C. Tsai, N. Mukherjee, O. Samman, Y. Zaidan, and S. M. Reddy,
    “Resource allocation and test scheduling for concurrent test of core-based SOC design,” in
    Proc. Tenth IEEE Asian Test Symp. (ATS), (Kyoto), pp. 265–270, Nov. 2001.
    [78] Y. Huang, S. M. Reddy, W.-T. Cheng, and P. Reuter, “Optimal core wrapper width selection
    and SOC test scheduling based on 3-D bin packing algorithm,” in Proc. Int. Test Conf. (ITC),
    (Baltimore), pp. 74–82, Oct. 2002.
    [79] G. L. Craig, C. R. Kime, and K. K. Saluja, “Test scheduling and control for VLSI built-in
    self-test,” IEEE Trans. Computers, vol. 37, pp. 1099–1109, Sept. 1988.
    [80] V. Iyengar, K. Chakrabarty, and E. J. Marinissen, “Integrated wrapper/TAM co-optimization,
    constraint-driven test scheduling, and tester data volumne reduction for SOCs,” in Proc.
    IEEE/ACM Design Automation Conf. (DAC), (New Orleans), pp. 685–690, June 2002.
    [81] C.-P. Su and C.-W. Wu, “Graph-based power-constrained test scheduling for SOC,” in Proc.
    IEEE Int. Workshop on Design and Diagnostics of Electronic Circuits and Systems (DDECS),
    (Brno, Czech Republic), pp. 61–68, Apr. 2002. (Best Paper Award).
    [82] E. Marinissen, R. Kapur, and Y. Zorian, “On using IEEE P1500 SECT for test plug-n-play,”
    in Proc. Int. Test Conf. (ITC), pp. 770–777, 2000.
    [83] E. J. Marinissen, S. Goel, and M. Lousberg, “Wrapper design for embedded core test,” in
    Proc. Int. Test Conf. (ITC), pp. 911–920, 2000.
    [84] E. J. Marinissen and S. K. Goel, “Analysis of test bandwidth utilization in test bus and TestRail
    architectures for SOCs,” in Proc. IEEE Int. Workshop on Design and Diagnostics of
    Electronic Circuits and Systems (DDECS), pp. 52–60, Apr. 2002.
    [85] V. Iyengar and K. Chakrabarty, “Test bus sizing for system-on-a-chip,” IEEE Trans. Computers,
    vol. 51, pp. 449–459, May 2002.
    [86] M. C. Golumbic, Algorithmic Graph Theory and Perfect Graphs. New York: Academic
    Press, 1980.
    [87] W.-L. Hsu and T.-H. Ma, “Fast and simple algorithm for recognizing chordal comparability
    graphs and interval graphs,” SIAM J. Computing, vol. 28, no. 3, pp. 1004–1020, 1999.
    [88] E. T. F. Glover and D. de Werra, “A user’s guide to Tabu Search,” Annals of Operations
    Research, vol. 41, pp. 3–28, 1993.
    [89] E. J. Marinissen, V. Iyengar, and K. Chakrabarty, “A set of benchmarks for modular testing
    of SOCs,” in Proc. Int. Test Conf. (ITC), (Baltimore), pp. 519–528, Oct. 2002.
    [90] C.-P. Su and C.-W.Wu, “A graph-based approach to power-constrained SOC test scheduling,”
    J. Electronic Testing: Theory and Applications, vol. 20, pp. 45–60, Feb. 2003.

    無法下載圖示 全文公開日期 本全文未授權公開 (校內網路)
    全文公開日期 本全文未授權公開 (校外網路)

    QR CODE