Tailoring a Reconfigurable Platform to SHA-256 and HMAC through Custom Instructions and Peripherals


This paper introduces the specialization of a NIOS2 processor targeting the computation of message authentication codes and integrity checks in constrained environments. Several hardware/software partitioning levels are considered, which vary from simple functions implemented as custom instructions to complete algorithms as peripherals. Our experimental… (More)
DOI: 10.1109/ReConFig.2009.40


8 Figures and Tables