A practical power model of AMBA system for high-level power analysis

Author(s):  
Sung-Che Li ◽  
Wei-Ting Liao ◽  
Mu-Shun Lee ◽  
Wen-Tsan Hsieh ◽  
Chien-Nan Jimmy Liu
2012 ◽  
Vol 11 (1) ◽  
pp. 13-16 ◽  
Author(s):  
R. Piscitelli ◽  
A. Pimentel
Keyword(s):  

2013 ◽  
Vol 33 (4) ◽  
pp. 1035-1051 ◽  
Author(s):  
Yaseer Arafat Durrani ◽  
Teresa Riesgo Alcaide

VLSI Design ◽  
1998 ◽  
Vol 7 (3) ◽  
pp. 225-242 ◽  
Author(s):  
Vivek Tiwari ◽  
Mike Tien-Chien Lee

A new approach for power analysis of microprocessors has recently been proposed [14]. The idea is to look at the power consumption in a microprocessor from the point of view of the actual software executing on the processor. The basic component of this approach is a measurement based, instruction-level power analysis technique. The technique allows for the development of an instruction-level power model for the given processor, which can be used to evaluate software in terms of the power consumption, and for exploring the optimization of software for lower power. This paper describes the application of this technique for a comprehensive instruction-level power analysis of a commercial 32-bit RISC-based embedded microcontroller. The salient results of the analysis and the basic instruction-level power model are described. Interesting observations and insights based on the results are also presented. Such an instruction-level power analysis can provide cues as to what optimizations in the micro-architecture design of the processor would lead to the most effective power savings in actual software applications. Wherever the results indicate such optimizations, they have been discussed. Furthermore, ideas for low power software design, as suggested by the results, are described in this paper as well.


2012 ◽  
Vol 256-259 ◽  
pp. 2820-2825
Author(s):  
A Zadali Mohammad Kootiani ◽  
P Abedi

Differential power analysis (DPA) attack is an important threat that researchers spend great effort to make crypto algorithms resistant against DPA attacks. In order to determine whether the hardware has DPA leakage before manufacturing, an accurate power model in digital simulation has been generated. FPGAs Arrays are attractive options for hardware implementation of encryption algorithms. In this paper, we show generated power model by using integer numbers whole DES’s rounds vs. S-Box alone, and this method gives more realistic results to determine the effectiveness of the improvements protect whole DES rather than in which only informer elements in the DES round. In particular this allows the user to isolate some parts of its implementation in order to analyze information leakages directly linked to them. We review s-box because it’s get 2kbit or 20% CLB slice from FPGA to implement DES or TDES. This paper try to identify role of Sbox in DPA.


Sign in / Sign up

Export Citation Format

Share Document