In this paper, we present and compare efficient low-power hardware architectures for accelerating the Packet Data Convergence Protocol (PDCP) in LTE and LTE-Advanced mobile terminals. Specifically, our work proposes the design of two cores: a crypto engine for the Evolved Packet System Encryption Algorithm (128-EEA2) that is based on the AES cipher and a coprocessor for the Least Significant Bit (LSB) encoding mechanism of the Robust Header Compression (ROHC) algorithm. With respect to the former, first we propose a reference architecture, which reflects a basic implementation of the algorithm, then we identify area and power bottle-necks in the design and finally we introduce and compare several architectures targeting the most power-consu...
Evolution) wireless communication standard is among the most challenging tasks in terms of computati...
Iterative decoding techniques for modern capacity-approaching codes are currently dominating the cho...
Summarization: Network data are, currently, often encrypted at a low level. In addition, as it is wi...
Copyright © 2013 Shadi Traboulsi et al.is is an open access article distributed under the Creative C...
Abstract—In this paper we investigate hardware implemen-tations of ciphering algorithms, SNOW 3G and...
In LTE base-stations, RoHC is a processingintensive algorithm that may limit the system from serving...
Abstract—In this paper we present detailed profiling results and identify the time critical algorith...
Abstract—In this paper we present a design methodology for the identification and development of a s...
Due to the extensive growth of Internet of Things (IoT), the number of wireless devices connected to...
Abstract—In this paper we present an architectural analysis of a smart DMA (sDMA) controller for pro...
The Internet of Things (IoT) consists of an ever-growing network of wireless-connected electronic de...
Providing information security is crucial for the Internet of Things (IoT) devices, platforms in whi...
Abstract. Stream ciphers SNOW 3G and ZUC are the major players in the domain of next generation mobi...
In this Master Thesis we aim to evaluate the Robust Header Compression protocol in cel- lular IoT. T...
In order to meet the latency requirements of the Ultra-Reliable Low Latency Communication (URLLC) mo...
Evolution) wireless communication standard is among the most challenging tasks in terms of computati...
Iterative decoding techniques for modern capacity-approaching codes are currently dominating the cho...
Summarization: Network data are, currently, often encrypted at a low level. In addition, as it is wi...
Copyright © 2013 Shadi Traboulsi et al.is is an open access article distributed under the Creative C...
Abstract—In this paper we investigate hardware implemen-tations of ciphering algorithms, SNOW 3G and...
In LTE base-stations, RoHC is a processingintensive algorithm that may limit the system from serving...
Abstract—In this paper we present detailed profiling results and identify the time critical algorith...
Abstract—In this paper we present a design methodology for the identification and development of a s...
Due to the extensive growth of Internet of Things (IoT), the number of wireless devices connected to...
Abstract—In this paper we present an architectural analysis of a smart DMA (sDMA) controller for pro...
The Internet of Things (IoT) consists of an ever-growing network of wireless-connected electronic de...
Providing information security is crucial for the Internet of Things (IoT) devices, platforms in whi...
Abstract. Stream ciphers SNOW 3G and ZUC are the major players in the domain of next generation mobi...
In this Master Thesis we aim to evaluate the Robust Header Compression protocol in cel- lular IoT. T...
In order to meet the latency requirements of the Ultra-Reliable Low Latency Communication (URLLC) mo...
Evolution) wireless communication standard is among the most challenging tasks in terms of computati...
Iterative decoding techniques for modern capacity-approaching codes are currently dominating the cho...
Summarization: Network data are, currently, often encrypted at a low level. In addition, as it is wi...