Design Automation for Processor Pipelines. Embedded system processors comprise about eighty percent of the processor market. This project targets this particular segment, customising multi-processor system on chips for a particular class of embedded applications, resulting in superior performance, low power and reduced cost. Direct benefits will include clear understanding of architectures and algorithms, research training, better processors for the embedded market, and quality publications. Ind ....Design Automation for Processor Pipelines. Embedded system processors comprise about eighty percent of the processor market. This project targets this particular segment, customising multi-processor system on chips for a particular class of embedded applications, resulting in superior performance, low power and reduced cost. Direct benefits will include clear understanding of architectures and algorithms, research training, better processors for the embedded market, and quality publications. Indirect benefits will be commercialisation and licensing of this technology for use in the embedded systems design industry. Companies which can benefit from this technology exist in Australia and overseas.Read moreRead less
RNS Hardware for Public-Key Cryptography and E-security. In a world where electronic communication is ever-present, the security of electronic information, e-security, is an issue of the utmost concern for government, business and individuals alike. Public-key cryptography is a powerful tool in the e-security toolkit. Using this technology it is possible to confirm the identity of individuals, maintain the privacy of personal data and guarantee the authenticity of transactions.
The aim of this ....RNS Hardware for Public-Key Cryptography and E-security. In a world where electronic communication is ever-present, the security of electronic information, e-security, is an issue of the utmost concern for government, business and individuals alike. Public-key cryptography is a powerful tool in the e-security toolkit. Using this technology it is possible to confirm the identity of individuals, maintain the privacy of personal data and guarantee the authenticity of transactions.
The aim of this project is to design new public-key cryptography hardware to provide faster, more secure communications for computers, networks and smart cards. Achieving this will require innovations in the way computers perform arithmetic and how this arithmetic is realised as an integrated circuit.Read moreRead less
Automatic Co-Processor Synthesis for Application Specific Instruction Set Processors. Embedded system processors comprise of about eighty percent of the processor market. This project targets this particular segment, customising processors for a particular embedded application, resulting in superior performance, low power and reduced cost. Direct benefits will include clear understanding of architectures and algorithms, research training, better processors for the embedded market, and quality ....Automatic Co-Processor Synthesis for Application Specific Instruction Set Processors. Embedded system processors comprise of about eighty percent of the processor market. This project targets this particular segment, customising processors for a particular embedded application, resulting in superior performance, low power and reduced cost. Direct benefits will include clear understanding of architectures and algorithms, research training, better processors for the embedded market, and quality publications. Indirect benefits will be commercialisation and licensing of this technology for use in the processor design industry. Read moreRead less