Review Article

A Security Scheme for Dependable Key Insertion in Mobile Embedded Devices

Table 1

Resource usage.

Okamoto Schnorr
Slices Slice FlipFlops LUTs BRAMs Slices Slice FlipFlops LUTs BRAMs

Complete system 2651 2263 4323 8 2439 2026 3799 5

IPicoBlaze 389 286 714 1 389 286 714 1

IICPM 2275 1977 3585 0 2039 1740 3055 0

II-a BigINTmul 265 392 201 0 265 392 201 0
II-b HECC processing 1684 1082 2855 7 1682 1081 2759 4

II-b-iHECCCTRL 61 32 108 0 61 32 108 0
II-b-iidALU 953 658 1611 0 953 658 1611 0
II-b-iiiProgramMem 50 70 93 1 50 70 93 1
II-b-ivdbus 98 0 162 0 98 0 162 0
II-b-vDataMem(single page) 453 324 838 6
II-b-viDataMem(double page) 452 324 657 3