{"title":"Power estimation of cryptographic modules using virtual SoC platform","authors":"Sungjae Yoon, Kihyuk Park, Wonjong Kim, H. Cho","doi":"10.23919/ELINFOCOM.2018.8330655","DOIUrl":null,"url":null,"abstract":"The power consumption in cryptographic modules depends on hardware and software. The virtual SoC platform is a good candidate for co-designing them together and to estimate performance and power consumption. We proposed the method to estimate power consumption of the cryptographic modules using virtual SoC platform. The power consumption of cryptographic modules depends on the status of each cryptographic module. To minimize the increase in simulation time, we only consider the changes of state registers. The experimental results show that the power estimation of cryptographic modules can be estimated with reasonable error bounding using the proposed method.","PeriodicalId":413646,"journal":{"name":"2018 International Conference on Electronics, Information, and Communication (ICEIC)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Electronics, Information, and Communication (ICEIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23919/ELINFOCOM.2018.8330655","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
The power consumption in cryptographic modules depends on hardware and software. The virtual SoC platform is a good candidate for co-designing them together and to estimate performance and power consumption. We proposed the method to estimate power consumption of the cryptographic modules using virtual SoC platform. The power consumption of cryptographic modules depends on the status of each cryptographic module. To minimize the increase in simulation time, we only consider the changes of state registers. The experimental results show that the power estimation of cryptographic modules can be estimated with reasonable error bounding using the proposed method.