Research Article

Low-Complexity Online Synthesis for AMIDAR Processors

Table 2

Complexity of the schedules of benchmark applications.

(a) Round key generation of encryption of cryptographic cipher benchmarks

RijndaelTwofishRC6Serpent
States Contexts States Contexts States Contexts States Contexts

55 31 122 83 44 20 103 42

(b) Single-block encryption of encryption of cryptographic cipher benchmarks

RijndaelTwofishRC6Serpent
States Contexts States Contexts States Contexts States Contexts

69 23 40 20 23 19 152 54

(c) Hash algorithms and message digests

SHA-1SHA-256MD5
States Contexts StatesContexts StatesContexts

138 29 9230 53120

(d) Image processing kernels

Sobel convolutionGrayscale filterContrast filter
States Contexts StatesContexts StatesContexts

86 23 139 5618

(e) JPEG-encoding and its application kernels

JPEG-encoderColor space transformationForward DCTQuantization
States Contexts States Contexts States Contexts States Contexts

105 55 17 14 67 36 16 11