Bitcoin mining machines become a new driving force to push the physical limitation of semiconductor process technology. Instead of peak performance, mining machines pursue energy and computation efficiency of implemen...
详细信息
ISBN:
(纸本)9781450392105
Bitcoin mining machines become a new driving force to push the physical limitation of semiconductor process technology. Instead of peak performance, mining machines pursue energy and computation efficiency of implementing cryptographic hash functions. Therefore, the state-of-the-art ASIC design of mining machines adopts near-threshold computing, deep pipelines, and unidirectional data flow. According to these design properties, in this paper, we propose a novel clock reversing tree design methodology for bitcoin mining machines. In the clock reversing tree, the clock of global tree is fed from the last pipeline stage backward to the first one, and the clock latency difference between the local clock roots of two consecutive stages maintains a constant delay. The local tree of each stage is well balanced and keeps the same clock latency. The special clock topology naturally utilizes setup time slacks to gain hold time margins. Moreover, to alleviate the incurred on-chip variations due to near-threshold computing, we maximize the common clock path shared by flip-flops of each individual stage. Finally, we perform inverter pair swap to maintain duty cycle. Experimental results show that our methodology is promising for industrial bitcoin mining designs: Compared with two variation-aware clock network synthesis approaches widely used in modern ASIC designs, our approach can reduce up to 64% clock buffer/inverter usage, 12% clock power, decrease 99% hold time violating paths, and achieve 85% area saving for timing fixing. The proposed clock design methodology is general and applicable to blockchain and other ASICs with deep pipelines and strong data flow.
The advancement of internet-based applications generated enormous voluminous media data, requiring effective storage and processing pipelines to handle the complexity of data and flow of information. For many years, c...
详细信息
The advancement of internet-based applications generated enormous voluminous media data, requiring effective storage and processing pipelines to handle the complexity of data and flow of information. For many years, cloud computing platforms provide storage facilities for many user applications and use-cases where voluminous data can be stored and manage effectively. The current research effort is still towards enlarging the storage and processing capacity of cloud servers at different user terminals. However, it is observed by exploring the traditional approaches in cloud storage management is- cloud storage bucket can effectively manage the data. Still, it doesn't ensure a higher degree of security of the data stored in the untrusted cloud storage buckets. Thereby, it is essential to develop security solution modeling to ensure data integrity in the cloud-to-cloud information migration process. Although a research trend indicates substantial effort towards developing cryptography-based solution approaches, most of them intensify the communication burden during execution. The study addresses this problem and applies the strength factor of blockchain-based security measures to preserve the integrity in distributed cloud architecture. The entire concept of the study is represented with an analytical form which shows how high dimensional media data is encrypted in cloud storage buckets using simplified hash-based 2-layers of encryption using SHA-256. The experimental analysis of the security approach shows that it ensures a higher degree of data security in the cloud-to-cloud migration with considerable numerical outcomes.
This paper discusses some software techniques, targeted specifically to the 2nd Generation Intel® Core™ processor, for speeding up the NIST standardized secure hash algorithms SHA-1, SHA-256 and SHA-512. We demon...
详细信息
暂无评论