Fig 2 - uploaded by Dawood Alnajjar
Content may be subject to copyright.
CRC32 parallel implementation with variable width processing 

CRC32 parallel implementation with variable width processing 

Source publication
Conference Paper
Full-text available
Cyclic Redundancy Check (CRC) is an essential component in various integrated circuits of the electronics industry. This paper is a CRC comprehensive guide that explores various approaches for CRC implementations in hardware, and demonstrates synthesis estimation results for understanding their impact. Finally, it assists the designer to customize...

Context in source publication

Context 1
... yield the same results. This case study is demonstrated in Figure 2. The design uses parallel CRCs of various input lengths with granularity of 1 byte for the purpose of processing the last sub-message of data (multiples of 1 byte). ...

Similar publications

Article
Full-text available
Currently technologies which are applied for leather cutting include slitting knifes, die press techniques and manual cutting. Use of laser technology has grown significantly during recent years due to number of advantages over conventional cutting methods; flexibility, high production speed, possibility to cut complex geometries, easier cutting of...
Article
Full-text available
Basic objective of designers and manufacturers is a technical system with better features than others, especially their competitors. On the other side, customers demand a product that enables maximum gains and minimum costs. In such a way, key issue in decision making process is selection of different options, and finding out the best one. This pap...

Citations

... FFT [39] is represented with pseudocode in Algorithm 1, where FFT128 and FFT32 refer to a sample size of 128 and 32, respectively. CRC32 [40] that generates 32-bit hash value is represented with pseudocode in Algorithm 2. Produced 32-bit hash is often used as a checksum to verify the integrity of data. MD5 [41], a widely-used cryptographic hash function that produces a 128-bit (16-byte) hash value is represented in Algorithm 3. SHA-256 [42], a cryptographic hash function that generates a 256-bit (32-byte) hash value is represented in Algorithm 4. This algorithm takes input data of any length and produces a unique, fixed-length 256-bit hash. ...
Article
Full-text available
Dynamic voltage and frequency scaling (DVFS) is a technique used to optimize energy consumption in ultra-low-power embedded systems. To ensure sufficient computational capacity, the system must scale up its performance settings. The objective is to conserve energy in times of reduced computational demand and/or when battery power is used. Fast Fourier Transform (FFT), Cyclic Redundancy Check 32 (CRC32), Secure Hash Algorithm 256 (SHA256), and Message-Digest Algorithm 5 (MD5) are focused functions that demand computational power to achieve energy-efficient performance. Selected operations are analyzed from the energy consumption perspective. In this manner, the energy required to perform a specific function is observed, thereby mitigating the influence of the instruction set or system architecture. For stable operating voltage scaling, an exponential model for voltage calculation is presented. Statistical significance tests are conducted to validate and support the findings. Results show that the proposed optimization technique reduces energy consumption for ultra-low-power applications from 27.74% to up to 47.74%.