Substituting portion of template instruction parameter with selected virtual instruction parameter

Information

  • Patent Grant
  • 8447958
  • Patent Number
    8,447,958
  • Date Filed
    Friday, March 6, 2009
    15 years ago
  • Date Issued
    Tuesday, May 21, 2013
    11 years ago
Abstract
A configurable instruction set architecture is provided whereby a single virtual instruction may be used to generate a sequence of instructions. Dynamic parameter substitution may be used to substitute parameters specified by a virtual instruction into instructions within a virtual instruction sequence.
Description
FIELD OF THE INVENTION

This invention relates to a technique for providing configurable instruction sequence generation, and more particularly to a technique for using virtual instructions to generate a sequence of instructions to be executed by a processor.


BACKGROUND OF THE INVENTION

Reduced instruction set computer (RISC) architectures were developed as industry trends tended towards larger, more complex instruction sets. By simplifying instruction set designs, RISC architectures make it easier to use techniques such as pipelining and caching, thus increasing system performance. By focusing on speed and simplicity of design, rather than instruction semantics, RISC architectures often result in larger executable code size than comparable complex instruction set computer (CISC) architecture machines. For example, a task that may be represented as one complex instruction in a CISC architecture may take two or more instructions in a RISC architecture. However, the performance gains resulting from increased clock speeds and increased pipelining that may be attained with a RISC architecture usually outweigh any increase in executable code size.


RISC architectures usually have fixed-length instructions (e.g., 16-bit, 32-bit, or 64-bit), with few variations in instruction format. For example, each instruction in an instruction set architecture (ISA) may have the source registers in the same location. For example, a 32-bit ISA may have source registers specified always by bits 16-20 and 21-25. This allows the specified registers to be fetched for every instruction without requiring any complex instruction decoding.


SUMMARY

In one general aspect, an instruction set architecture includes a virtual instruction for generating a sequence of underlying machine instructions. A virtual instruction includes an opcode that identifies the instruction as a virtual instruction. The virtual instruction, having zero or more virtual parameters, is associated with a sequence of instructions.


Implementations may include a virtual instruction index within a virtual instruction code. The index may identify one virtual instruction from multiple available virtual instructions. Some implementations may provide virtual parameters, each of which includes a predetermined number of bits; or each of which includes either a first predetermined number of bits or a second predetermined number of bits. For example, one implementation may provide three-bit and five-bit virtual parameters.


Each virtual instruction is associated with a sequence of instructions to execute. Each instruction in the sequence may include an instruction template identifying an instruction to be performed, a parameter selector identifying a dynamic parameter substitution, and other control information relating to the execution of that instruction within the sequence. Implementations may include one or more of the following substitutions: a parameter field, such as a register specifier, may be replaced by a virtual parameter; an opcode field may be replaced by a virtual parameter; an immediate field may be replaced by a virtual parameter; an immediate field may be replaced with a sign-extension of a virtual parameter; and an immediate field may be replaced with sign-extended or unextended concatenations of one or more virtual parameters.


The details of one or more implementations are set forth in the accompanying drawings and the description below. Other features and advantages will be apparent from the description and drawings, and from the claims.





DESCRIPTION OF DRAWINGS


FIG. 1 is a block diagram of an exemplary five-stage pipeline that may be used in a RISC architecture.



FIG. 2 is a block diagram showing parameter substitution for an exemplary configurable sequence generation instruction.



FIG. 3 is an instruction encoding for an exemplary configurable sequence generation instruction.



FIG. 4 is a flowchart showing a method of processing virtual instructions.





DETAILED DESCRIPTION

A virtual instruction is an instruction that is not executed directly by a processor. Rather, a virtual instruction causes a sequence of one or more instructions to be generated. The generated instructions then are executed by the processor. Virtual instructions may be used to provide more complex instructions in an ISA.


For example, a standard ISA may not have an operation for adding three numbers together and storing the result in a register. A particular application using the ISA may repeatedly add three numbers. The developers of a processor for the particular application may not wish to modify the processor entirely, yet significant code compaction may be obtained by providing an instruction for adding three numbers. A virtual instruction called “ADD3” that adds three numbers may be provided. Whenever the “ADD3” instruction is fetched, the system identifies the instruction as a virtual instruction and generates a corresponding sequence of instructions to add three numbers.


Virtual instructions provide a mechanism to implement a configurable instruction set architecture so that application-specific instructions or other specialized instructions may be added to an instruction set without redesigning or modifying a processor core.


Referring to FIG. 1, an exemplary microprocessor architecture that may be used to implement virtual instructions includes a five-stage pipeline in which each instruction is executed in a fixed amount of time, such as, for example, four clock cycles. The execution of each instruction is divided into five stages: instruction fetch (IF) stage 1001, register read (RD) stage 1002, arithmetic/logic unit (ALU) stage 1003, memory (MEM) stage 1004, and write back (WB) stage 1005. In the IF stage 1001, a specified instruction is fetched from an instruction cache. A portion of the fetched instruction is used to specify source registers that may be used in executing the instruction. In the read registers (RD) stage 1002, the system fetches the contents of the specified source registers. These fetched values may be used to perform arithmetic or logical operations in the ALU stage 1003. In the MEM stage 1004, an executing instruction may read/write memory in a data cache. Finally, in the WB stage 1005, values obtained by the execution of the instruction may be written back to a register.


Because some operations, such as floating point calculations and integer multiply/divide, cannot be performed in a single clock cycle, some instructions merely begin execution of an operation. After sufficient clock cycles have passed, another instruction may be used to retrieve a result. For example, an integer multiply instruction may take, for example, five clock cycles. One instruction may initiate the multiplication calculation, and another instruction may load the results of the multiplication into a register.


Virtual instructions help to offset costs that may be associated with the simplicity, elegance, and adherence to design principles provided by RISC architectures. Because multiple RISC instructions often are used instead of a single complex instruction, the overall size of executables is larger for RISC architectures than for others. Because computer storage is usually inexpensive, the increased storage costs are rarely a factor. However, in some applications, such as smart cards and application specific integrated circuits (ASICs), the available memory may be limited. In applications such as these, virtual instructions provide a mechanism for reducing the size of executables without significantly reducing pipeline efficiency.


Virtual instructions also offer benefits in consumer electronics, such as wireless telephones, global positioning system receivers, electronic games, and personal digital assistants, which have contributed to the growth of the embedded CPU market. Instead of building devices from commercially available, general-purpose components, manufacturers have increasingly turned to designs based on application-specific integrated circuits (ASICs). When CPU cores are embedded on chips complete with on-board caches and memory, the amount of storage space may be limited. Virtual instructions help to decrease the size of executables by adding the capability of executing complex instructions.


For example, a developer may need a compact code solution for embedded control applications. Some CISC products may include 32-bit instructions capable of setting, clearing, or testing a single bit in memory or input/output (I/O) space. While it generally may not be desirable to include such operations within a RISC processor core, virtual instructions provide a general mechanism in a RISC ISA that allows developers to add complex instructions appropriate to specific applications.


Referring to FIG. 2, a virtual instruction 200 is used to generate a sequence of instructions. In one implementation, virtual instruction 200 includes an index 201 and zero or more parameters, such as parameters 202 and 203. In this implementation, index 201 references a location within a virtual start table 210 to identify a start address for the appropriate sequence of instructions within an instruction expansion store 220.


In FIG. 2, index 201 is three bits long. Thus, eight virtual instructions may be specified in this implementation. As will be discussed more fully below, there is a tradeoff between the number of virtual instructions available and the amount of parameter information that may be encoded in a virtual instruction. Index 201 identifies an address within the virtual start table 210. Virtual start table 210 may be a data structure containing information about the locations of instructions corresponding to index 201. For example, virtual start table 210 may contain a start address within instruction expansion store 220 for each virtual instruction.


Instruction expansion store 220 may be implemented as a data structure containing one or more rows of data. Each row within the data structure may include an instruction to be executed as well as a dynamic parameter selector and other control information. For example, the exemplary instruction expansion store 220 shown in FIG. 2 includes the instruction “ADDI $7, 0” and the dynamic parameter selector “Imm=P1∥P0”. The ADDI instruction adds the contents of a register and an immediate value and stores the result in an indicated register. In this example, the parameters P1 and P0 are concatenated and substituted for the immediate value within the instruction, resulting in “ADDI $7,0xff”. Thus, the value “0xff” will be added to register $7. The next instruction in the sequence is “ADD $8, $7” with the parameter selector “rt=P3”. The ADD instruction adds the contents of two registers and stores the result in an indicated register. In this example, substitution yields the instruction “ADD $8, $7, $9” assuming the contents of P3 is “9”. Thus, the contents of registers $7 and $9 are added and stored in register $8.


A virtual program counter (PC) 230 stores the address or offset of the current instruction within the instruction expansion store 220. For example, when a virtual instruction begins execution, the start address for the corresponding instruction sequence is loaded into the virtual PC 230. As each instruction is executed, virtual PC 230 may be updated to step through the instruction expansion store 220 until the last instruction within a sequence is generated.


The last instruction within a virtual instruction expansion may be indicated in many ways. For example, information stored along with the dynamic parameter selector may be used to indicate the end of an instruction sequence. For example, if a 32-bit word is used to direct dynamic parameter substitution, one or more bits may be used to indicate that the instruction is the last within an expansion. Additionally, a new instruction may be used to indicate that the last instruction has been reached.


Substitution logic 240 is used to substitute parameters from virtual instruction 200 into instruction templates from instruction expansion store 220. The resulting instruction then may be passed on to the decode stage 250 of the processor.


Additional implementations may not use a virtual start table 210. If only a single virtual instruction is provided, or if virtual instruction expansion information is stored in a fixed or known location, then the extra level of indexing provided by virtual start table 210 may be unnecessary. In such implementations, index 201 also may not be needed, and an opcode may be sufficient to identify a particular virtual instruction and to locate the beginning of corresponding instructions within instruction expansion store 220.


Referring to FIG. 3, a virtual instruction 200 may be encoded in a 32-bit instruction architecture. In this exemplary encoding, bits 11-15 and 27-31 identify the instruction as a virtual instruction. Select bits 24-26 may be used to identify one of eight virtual instructions that can be implemented. The remaining bits specify parameters used by substitution logic 240. These may be used to identify immediate values, opcodes and/or sub-opcodes, and to identify registers to be used by instructions within a virtual instruction sequence.


During execution of a virtual instruction, the virtual instruction is held in the instruction fetch stage of the pipeline, and the PC, as opposed to the virtual PC, remains fixed at the address of the virtual instruction, while the fetch logic passes a fixed sequence of instructions to the decode stage of the pipe. When the last instruction has been issued, the PC can advance. As the entire sequence takes place at the same PC, conventional branches which manipulate the PC may not take place internal to the virtual instruction sequence—though a virtual instruction sequence could conceivably terminate with a control transfer. Conditional execution within a virtual instruction may be handled in terms of conditional moves or other predicated execution mechanisms. In the simplest implementation, any exceptions taken during the execution of the virtual instruction sequence use the address of the virtual instruction as the value of the exception return address (EPC) register or error PC, and restart the virtual instruction sequence from the beginning after completion of any exception handling. For this reason, it may be desirable to use virtual instructions that are fully restartable at any point in their execution.


Additional implementations may allow branching within a virtual instruction expansion. For example, one virtual instruction implementation may provide specific instructions for branching within a virtual instruction sequence, allowing branching within the expansion of a virtual instruction. Another implementation may redefine the semantics of branch instructions so that when conventional branch instructions are encoded within a virtual instruction expansion they exhibit different behavior. Other virtual instruction branching schemes will be apparent.


In the following discussion, “VINSTR” is used as the name for application-specific virtual instructions. Generic compiler tools may assemble and disassemble the instruction by that name, but tools also may give application-specific names to various VINSTR instantiations. For example, the generic VINSTR instruction includes the parameters as shown in FIG. 3: SELECT, P0, P1, P2, P3, and P4. The SELECT parameter determines which of the possible virtual instruction sequences to execute. The remaining parameters are used as defined by instruction sequences stored in instruction expansion store 220. The exemplary encoding shown has five parameter fields, with two having five bits and three having three bits. Additional implementations may use any number of parameters and any number of bits to encode each parameter. For example, one implementation may use three parameter fields, with each parameter having five bits.


Additional implementations may encode a virtual instruction using a code to specify the virtual instruction expansion to be performed, and one or more parameters. As will be discussed below with reference to parameter selection, there is a trade-off between compactness, complexity, and flexibility of parameter substitutions.


Referring to FIG. 4, virtual instructions may be processed using the structures described above with reference to FIG. 2. Initially, a processor reads the next instruction (step 4001). The processor then determines if the instruction is a virtual instruction (step 4002). If it is not, then the processor processes the instruction normally (step 4003). If the instruction is a virtual instruction, then the system determines the start address of the virtual instruction (step 4004). If more than one virtual instruction is supported, an index 201 may be used to specify a particular virtual instruction to execute. This index may be used to look up start values within virtual start table 210. This table may hold an address within instruction expansion store 220 of the first instruction to be executed. The system then loads the start address into the virtual PC (step 4005).


Next, the system uses the start address referenced by virtual PC 230 to lookup an instruction within instruction expansion store 220 (step 4006). For example, the virtual PC 230 shown in FIG. 2 references the instruction “ADDI $7, 0” within instruction store 220. The system also obtains a corresponding parameter selector (step 4007). This selector, which is discussed below, specifies which parameters from virtual instruction 200 to substitute into the current instruction. The system uses the instruction and parameter selector to perform parameter substitution (step 4008).


In some implementations, the parameter selector may support predicated execution of instructions within a virtual instruction expansion. Predicated execution may be implemented by using a parameter selector to indicate whether an instruction should be suppressed based on, for example, one or more virtual instruction parameters. In such an implementation, an instruction template, such as the “ADDI $7, 0” shown in FIG. 2, may include a corresponding parameter selector that indicates whether to suppress an instruction based on a parameter value. For example, the parameter selector may indicate to suppress the corresponding instruction based on the value of a parameter, such as P3. Instructions may be suppressed by issuing a NOP or other similar function.


The resulting instruction is returned as the result of IF stage 1001. The processor then executes this instruction (step 4009). Finally, the system determines if this was the last instruction within a virtual instruction sequence (step 4010). If there are additional instructions, the virtual PC is updated (step 4011) and the next instruction is loaded (step 4006). If there are no additional instructions, then the PC is updated (step 4012). In this implementation, the PC is not updated until the entire virtual instruction sequence is complete.


To support dynamic parameter substitution, the virtual instruction expansion store may contain more than just the sequence of 32-bit instructions to be presented to the pipeline. Additional information may be provided to indicate when, and how, parameters should be substituted for the literal content of fields within each 32-bit instruction.


Implementations may support any combination of the following dynamic parameter substitutions: (1) replacement of a parameter field with a translated or untranslated VINSTR parameter field; (2) replacement of an immediate field with a sign-extension of a VINSTR parameter field; (3) replacement of a portion of an immediate field with a VINSTR parameter field; (4) replacement of an immediate field with sign-extended or unextended concatenations of parameter fields; and/or (5) replacement of an instruction opcode or subopcode with a translated or untranslated VINSTR parameter.


One dynamic parameter substitution that may be provided is to replace a selected register field with a virtual instruction parameter. For example, an “ADD” instruction may have three parameters: “RS”, “RT”, and “RD”. The instruction causes the contents of the register specified by RS to be added to the contents of the register specified by RT and then stored in the register specified by RD. In virtual instruction 200, two parameters are specified, one parameter 202 having 3 bits and one parameter 203 having 5 bits. One implementation provides 32 registers, each register specified by 5 bits. In this example, parameter 202 may be translated to a 5-bit register specification. For example, one translation may be to append “00” to the beginning of the three-bit value, allowing only registers 0 to 8 to be specified.


Additional translations may be used. However, it may be necessary to limit certain expansions to certain parameter fields in order to reduce the combinatorial explosion of specifier data. There is a trade off between the increase in virtual instruction size and the decrease in virtual instruction capability that results from more restricted substitution.


Another dynamic parameter substitution that may be performed is the replacement of an immediate field with a sign-extension of a VINSTR parameter field. For example, the “ADDI” instruction allows an immediate value to be added to the contents of a register. This substitution allows the immediate value field to be specified by one of the virtual instruction parameter fields. The immediate field may be 16 bits, while the virtual instruction parameter may be only five bits. However, the 5-bit value may be sign extended to 16 bits. Sign extension may not be needed if the instructions are stored initially with zeros in the immediate field.


Another dynamic parameter substitution includes the replacement of immediate fields with sign-extended or unextended concatenations of parameter fields. For example, 8-bit immediate values may be created by concatenating 3-bit and 5-bit virtual instruction parameter fields. Additionally, dynamic parameter substitution may include the replacement of an instruction opcode or sub-opcode with a translated or untranslated VINSTR parameter field. This allows, for example, one or more instructions in a virtual instruction sequence to be selected by one or more VINSTR parameters.


In addition to virtual instruction implementations using hardware, (e.g., within a microprocessor or microcontroller) implementations also may be embodied in software disposed, for example, in a computer usable (e.g., readable) medium configured to store the software (i.e., a computer readable program code). The program code causes the enablement of the functions or fabrication, or both, of the systems and techniques disclosed herein. For example, this can be accomplished through the use of general programming languages (e.g., C, C++), hardware description languages (HDL) including Verilog HDL, VHDL, AHDL (Altera HDL) and so on, or other available programming and/or circuit (i.e., schematic) capture tools. The program code can be disposed in any known computer usable medium including semiconductor, magnetic disk, optical disk (e.g., CD-ROM, DVD-ROM) and as a computer data signal embodied in a computer usable (e.g., readable) transmission medium (e.g., carrier wave or any other medium including digital, optical, or analog-based medium). As such, the code can be transmitted over communication networks including the Internet and intranets.


It is understood that the functions accomplished and/or structure provided by the systems and techniques described above can be represented in a core (e.g., a microprocessor core) that is embodied in program code and may be transformed to hardware as part of the production of integrated circuits. Also, the systems and techniques may be embodied as a combination of hardware and software. Accordingly, other implementations are within the scope of the following claims.

Claims
  • 1. A pipelined microprocessor, comprising: instruction decode logic;a program counter configured to indicate a current location in a first instruction sequence;instruction fetch. Logic configured to fetch a first instruction from the current location in the first instruction sequence; anda parameter selector configured to, if the fetched first instruction from the first instruction sequence is a virtual instruction having one or more parameters, select a parameter from the one or more parameters of the first instruction based on control data, andwherein the instruction fetch logic is further configured to: maintain the first program counter at the address of the virtual instruction,select a second instruction sequence based on the virtual instruction,modify the selected parameter, wherein the modification of the selected parameter comprises sign-extending the selected parameter,substitute the modified parameter from the first instruction into a second instruction, the second instruction being from the second instruction sequence,pass each instruction of the second instruction sequence to the instruction decode logic, andafter the second instruction sequence has been executed or an exception occurs, advance the program counter and resume the first instruction sequence.
  • 2. The pipelined microprocessor of claim 1, wherein the instruction fetch logic is configured to substitute the modified parameter into the second instruction based on an instruction template.
  • 3. The pipelined microprocessor of claim 1, wherein the second instruction sequence includes a conditional move instruction, and wherein the instruction fetch logic substitutes the modified parameter from the first instruction into the conditional move instruction.
  • 4. The pipelined microprocessor of claim 1, wherein the second instruction sequence includes an instruction for branching, and wherein the parameter selector substitutes the modified parameter from the first instruction into the instruction for branching.
  • 5. The pipelined microprocessor of claim 1, wherein the second instruction sequence terminates with a control transfer instruction.
  • 6. The pipelined microprocessor of claim 1, wherein modification of the selected parameter further comprises translating a length of the selected parameter from one bit length to another bit-length.
  • 7. The pipelined microprocessor of claim 1, wherein the selected parameter and the modified parameter have different bit-widths.
  • 8. The pipelined microprocessor of claim 1, wherein modification of the selected parameter is based on an instruction template.
  • 9. A method for implementing virtual instructions in a processor, the method comprising: fetching a virtual instruction from a first sequence of instructions, wherein the virtual instruction has one or more parameters;determining a second sequence of instructions to be executed based on the virtual instruction;selecting an instruction from the second sequence of instructions;selecting a parameter from the one or more parameters of the virtual instruction based on control data;modifying the selected parameter, wherein the modification of the selected parameter comprises sign-extending the selected parameter;substituting a parameter of the selected instruction with the modified parameter from the virtual instruction;passing each of the second sequence of instructions to the instruction decode logic; andresuming the fetching of instructions from the first sequence of instructions.
  • 10. A pipelined microprocessor, comprising: instruction decode logic;a program counter configured to indicate a current location in a first instruction sequence;instruction fetch logic configured to fetch a first instruction from the current location in the first instruction sequence; anda parameter selectorconfigured to, if the fetched first instructions a virtual instruction having one or more parameters, select a first parameter from the one or more parameters of the first instruction based on control data, andwherein the instruction fetch logic is further configured to: maintain the first program counter at the address of the virtual instruction,select a second instruction sequence based on the virtual instruction,select a second parameter from a second instruction in the second instruction sequence;modify the second parameter, wherein the modification replaces a portion of the second parameter with the first parameter,pass each instruction of the second instruction sequence to the instruction decode logic, andafter the second instruction sequence has been executed or an exception occurs, advance the program counter and resume the first instruction sequence.
  • 11. A method for implementing virtual instructions in a processor, the method comprising: fetching a virtual instruction from a first sequence of instructions, wherein the virtual instruction has one or more parameters;determining a second sequence of instructions to be executed based on the virtual instruction;selecting an instruction from the second sequence of instructions;selecting a first and second parameter from the one or more parameters of the virtual instruction based on control data;selecting a third parameter from the second instruction;modifying the third parameter based on the first and second parameters, wherein the modification of the third parameter comprises at least one of: concatenating the first parameter with the second parameter, andreplacing the third parameter with the concatenated first and second parameters,passing each of the second sequence of instructions to the instruction decode logic; andresuming the fetching of instructions from the first sequence of instructions.
  • 12. The method of claim 11, wherein the first and second selected parameters have different bit-widths.
  • 13. The method of claim 11, wherein the modification of the third parameter is based on an instruction template.
  • 14. The method of claim 11, wherein the second sequence of instructions includes a conditional move instruction, and wherein modifying the third parameter comprises modifying a parameter of the conditional move instruction based on the first parameter.
  • 15. The method of claim 11, wherein the second sequence of instructions includes a branch instruction, and wherein modifying the third parameter comprises modifying a parameter of the branch instruction based on the first parameter.
  • 16. The method of claim 11, wherein the second sequence of instructions terminates with a control transfer instruction.
CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a divisional of U.S. patent application Ser. No. 11/644,001, filed Dec. 22, 2006, which is a continuation of U.S. patent application Ser. No. 09/788,682, filed Feb. 21, 2001, now issued U.S. Pat. No. 7,162,621 B2, both of which are incorporated herein by reference in their entireties. This application is related to the following commonly owned applications, each of which is incorporated herein by reference in its entirety: U.S. application Ser. No. 09/788,683, filed Feb. 21, 2001, now issued U.S. Pat. No. 7,237,097 B2; U.S. application Ser. No. 09/788,670, filed Feb. 21, 2001; U.S. application Ser. No. 09/788,684, filed Feb. 21, 2001; and U.S. application Ser. No. 09/788,685, filed Feb. 21, 2001, now issued U.S. Pat. No. 7,181,484 B2.

US Referenced Citations (236)
Number Name Date Kind
3614406 Brown Oct 1971 A
3642744 Moberly et al. Feb 1972 A
3654621 Bock et al. Apr 1972 A
3868649 Sato et al. Feb 1975 A
3916388 Shrimp et al. Oct 1975 A
4023023 Bourrez et al. May 1977 A
4085447 Pertl et al. Apr 1978 A
4109310 England et al. Aug 1978 A
4126896 Yamazaki Nov 1978 A
4128880 Cray, Jr. Dec 1978 A
4130880 Nutter Dec 1978 A
4173041 Dvorak et al. Oct 1979 A
4219874 Gusev et al. Aug 1980 A
4302820 Struger et al. Nov 1981 A
4307445 Tredennick et al. Dec 1981 A
4317170 Wada et al. Feb 1982 A
4323963 Wu Apr 1982 A
4394736 Bernstein et al. Jul 1983 A
4396982 Wada et al. Aug 1983 A
4434462 Guttag et al. Feb 1984 A
4446525 Hoch et al. May 1984 A
4491910 Caudel et al. Jan 1985 A
4495598 Vahlstrom et al. Jan 1985 A
4507731 Morrison et al. Mar 1985 A
4511990 Hagiwara et al. Apr 1985 A
4520439 Liepa May 1985 A
4538239 Magar Aug 1985 A
4569016 Hao et al. Feb 1986 A
4583199 Boothroyd et al. Apr 1986 A
4586130 Butts, Jr. et al. Apr 1986 A
4763246 Holt et al. Aug 1988 A
4771463 Beeman Sep 1988 A
4773006 Kinoshita et al. Sep 1988 A
4809212 New et al. Feb 1989 A
4811215 Smith Mar 1989 A
4814976 Hansen et al. Mar 1989 A
4821183 Hauris Apr 1989 A
4825363 Baumann et al. Apr 1989 A
4829380 Iadipaolo May 1989 A
4847801 Tong Jul 1989 A
4852037 Aoki Jul 1989 A
4860192 Sachs et al. Aug 1989 A
4868777 Nishiyama et al. Sep 1989 A
4878174 Watkins et al. Oct 1989 A
4879676 Hansen Nov 1989 A
4884197 Sachs et al. Nov 1989 A
4891781 Omura Jan 1990 A
4899275 Sachs et al. Feb 1990 A
4924435 Brunvand et al. May 1990 A
4928223 Dao et al. May 1990 A
4949250 Bhandarkar et al. Aug 1990 A
4992934 Portanova et al. Feb 1991 A
5005118 Lenoski Apr 1991 A
5073864 Methvin et al. Dec 1991 A
5136696 Beckwith et al. Aug 1992 A
5150290 Hunt Sep 1992 A
5177701 Iwasa Jan 1993 A
5181183 Miyazaki Jan 1993 A
5185713 Kobunaya Feb 1993 A
5193202 Jackson et al. Mar 1993 A
5220656 Itomitsu et al. Jun 1993 A
5222244 Carbine et al. Jun 1993 A
5235686 Bosshart Aug 1993 A
5280439 Quek et al. Jan 1994 A
5280593 Bullions, III et al. Jan 1994 A
5299147 Holst Mar 1994 A
5321821 Itomitsu et al. Jun 1994 A
5392228 Burgess et al. Feb 1995 A
5392408 Fitch Feb 1995 A
5396502 Owsley et al. Mar 1995 A
5418915 Matuda et al. May 1995 A
5452241 Desrosiers et al. Sep 1995 A
5471628 Phillips et al. Nov 1995 A
5479620 Kiyohara et al. Dec 1995 A
5499299 Takenaka et al. Mar 1996 A
5502829 Sachs Mar 1996 A
5513366 Agarwal et al. Apr 1996 A
5517438 Dao-Trong et al. May 1996 A
5537562 Gallup et al. Jul 1996 A
5537629 Brown et al. Jul 1996 A
5550768 Ogilvie et al. Aug 1996 A
5559974 Boggs et al. Sep 1996 A
5560028 Sachs et al. Sep 1996 A
5581773 Glover Dec 1996 A
5590345 Barker et al. Dec 1996 A
5598571 Gallup et al. Jan 1997 A
5664136 Witt et al. Sep 1997 A
5666298 Peleg et al. Sep 1997 A
5669010 Duluk, Jr. Sep 1997 A
5671401 Harrell Sep 1997 A
5673407 Poland et al. Sep 1997 A
5696937 White et al. Dec 1997 A
5713035 Farrell et al. Jan 1998 A
5717910 Henry Feb 1998 A
5721892 Peleg et al. Feb 1998 A
5726927 Wolrich et al. Mar 1998 A
5729554 Weir et al. Mar 1998 A
5729724 Sharangpani et al. Mar 1998 A
5729728 Colwell et al. Mar 1998 A
5734600 Dieffenderfer et al. Mar 1998 A
5734874 Van Hook et al. Mar 1998 A
5740340 Purcell et al. Apr 1998 A
5748979 Trimberger May 1998 A
5752071 Tubbs et al. May 1998 A
5758176 Agarwal et al. May 1998 A
5761523 Wilkinson et al. Jun 1998 A
5768172 Derby Jun 1998 A
5774709 Worrell Jun 1998 A
5778241 Bindloss et al. Jul 1998 A
5781457 Cohen et al. Jul 1998 A
5784602 Glass et al. Jul 1998 A
5790827 Leung Aug 1998 A
5793661 Dulong et al. Aug 1998 A
5794003 Sachs Aug 1998 A
5796973 Witt et al. Aug 1998 A
5798923 Laskowski Aug 1998 A
5809294 Ando Sep 1998 A
5812147 Van Hook et al. Sep 1998 A
5815695 James et al. Sep 1998 A
5815723 Wilkinson et al. Sep 1998 A
5819117 Hansen et al. Oct 1998 A
5822606 Morton Oct 1998 A
5838984 Nguyen et al. Nov 1998 A
5838986 Garg et al. Nov 1998 A
5848255 Kondo Dec 1998 A
5848269 Hara Dec 1998 A
5850452 Sourgen et al. Dec 1998 A
5852726 Lin et al. Dec 1998 A
5864703 Van Hook et al. Jan 1999 A
5867682 Witt et al. Feb 1999 A
5872919 Wakeland Feb 1999 A
5875336 Dickol et al. Feb 1999 A
5875355 Sidwell et al. Feb 1999 A
5880984 Burchfiel et al. Mar 1999 A
5881307 Park et al. Mar 1999 A
5887183 Agarwal et al. Mar 1999 A
5892960 Seide Apr 1999 A
5918031 Morrison et al. Jun 1999 A
5922066 Cho et al. Jul 1999 A
5926642 Favor Jul 1999 A
5933650 Van Hook et al. Aug 1999 A
5936872 Fischer et al. Aug 1999 A
5944776 Zhang et al. Aug 1999 A
5953241 Hansen et al. Sep 1999 A
5960012 Spracklen Sep 1999 A
5961629 Nguyen et al. Oct 1999 A
5996056 Volkonsky Nov 1999 A
5996062 Sachs Nov 1999 A
5996066 Yung Nov 1999 A
6006316 Dinkjian Dec 1999 A
6009261 Scalzi et al. Dec 1999 A
6009450 Dworkin et al. Dec 1999 A
6026420 DesJardins et al. Feb 2000 A
6035120 Ravichandran Mar 2000 A
6035316 Peleg et al. Mar 2000 A
6035317 Guy Mar 2000 A
6041403 Parker et al. Mar 2000 A
6058465 Nguyen May 2000 A
6058500 DesJardins et al. May 2000 A
6065115 Sharangpani et al. May 2000 A
6066178 Bair et al. May 2000 A
6067615 Upton May 2000 A
6073154 Dick Jun 2000 A
6075937 Scalzi et al. Jun 2000 A
6078941 Jiang et al. Jun 2000 A
6088783 Morton Jul 2000 A
6122738 Millard Sep 2000 A
6128726 LeComec Oct 2000 A
6138229 Kucukcakar et al. Oct 2000 A
6141421 Takaragi et al. Oct 2000 A
6141786 Cox et al. Oct 2000 A
6145077 Sidwell et al. Nov 2000 A
6154834 Neal et al. Nov 2000 A
6172494 Feuser Jan 2001 B1
6181729 O'Farrell Jan 2001 B1
6185668 Arya Feb 2001 B1
6192491 Cashman et al. Feb 2001 B1
6199087 Blake et al. Mar 2001 B1
6199088 Weng et al. Mar 2001 B1
6233597 Tanoue et al. May 2001 B1
6243732 Arakawa et al. Jun 2001 B1
6263429 Siska Jul 2001 B1
6266758 Van Hook et al. Jul 2001 B1
6279023 Weng et al. Aug 2001 B1
6282635 Sachs Aug 2001 B1
6292883 Augusteijn et al. Sep 2001 B1
6295599 Hansen et al. Sep 2001 B1
6298438 Thayer et al. Oct 2001 B1
6314445 Poole Nov 2001 B1
6336178 Favor Jan 2002 B1
6349318 Vanstone et al. Feb 2002 B1
6349377 Lindwer Feb 2002 B1
6381690 Lee Apr 2002 B1
6397241 Glaser et al. May 2002 B1
6421817 Mohan et al. Jul 2002 B1
6425124 Tominaga et al. Jul 2002 B1
6430684 Bosshart Aug 2002 B1
6453407 Lavi et al. Sep 2002 B1
6480605 Uchiyama et al. Nov 2002 B1
6480872 Choquette Nov 2002 B1
6513054 Carroll Jan 2003 B1
6523054 Kamijo Feb 2003 B1
6587939 Takano Jul 2003 B1
6615366 Grochowski et al. Sep 2003 B1
6618804 Steele, Jr. et al. Sep 2003 B1
6625726 Clark et al. Sep 2003 B1
6625737 Kissell Sep 2003 B1
6651160 Hays Nov 2003 B1
6658561 Benayoun et al. Dec 2003 B1
6711602 Bhandal et al. Mar 2004 B1
6715066 Steele, Jr. Mar 2004 B1
6760742 Hoyle Jul 2004 B1
6892293 Sachs et al. May 2005 B2
6952478 Lee et al. Oct 2005 B2
6976178 Kissell Dec 2005 B1
7003715 Thurston Feb 2006 B1
7142668 Kogure Nov 2006 B1
7162621 Kissell Jan 2007 B2
7181484 Stribark et al. Feb 2007 B2
7225212 Stribaek et al. May 2007 B2
7237097 Kissell et al. Jun 2007 B2
7277540 Shiba et al. Oct 2007 B1
7599981 Ekner et al. Oct 2009 B2
7617388 Kissell Nov 2009 B2
7698539 Banning et al. Apr 2010 B1
7711763 Stribaek et al. May 2010 B2
7860911 Stribaek et al. Dec 2010 B2
20010052118 Steinbusch Dec 2001 A1
20020013691 Warnes Jan 2002 A1
20020062436 Van Hook et al. May 2002 A1
20020069402 Nevill et al. Jun 2002 A1
20020116428 Stribaek et al. Aug 2002 A1
20020178203 Stribaek et al. Nov 2002 A1
20030172254 Mandavilli et al. Sep 2003 A1
20060190518 Ekner et al. Aug 2006 A1
20070106889 Kissell May 2007 A1
Foreign Referenced Citations (13)
Number Date Country
196 44 688 Apr 1998 DE
0 681 236 Nov 1995 EP
0 757 312 Feb 1997 EP
0 681 236 Nov 2000 EP
07-182142 Jul 1995 JP
10-11289 Jan 1998 JP
11-003226 Jan 1999 JP
11-174955 Jul 1999 JP
2000-293507 Oct 2000 JP
2000-321979 Nov 2000 JP
2001-034167 Feb 2001 JP
WO 9707450 Feb 1997 WO
WO 9708608 Mar 1997 WO
Non-Patent Literature Citations (170)
Entry
A236 Parallel Digital Signal Processor Chip Programmer's Reference Manual, Oxford Micro Devices, Inc., 1994, 195 pages (Bates Nos. L11184-L11378).
Bier, J., “DSP16xxx Targets Communications Apps,” Microprocessor Report, MicroDesign Resources, Sep. 15, 1997, pp. 11-15.
Clipper architecture: Information from Answers.com at http://www.answers.com/topic/clipper-architecture, 4 pages (retrieved Jul. 25, 2006).
Darrel Hankerson et al., Software Implementation of Elliptic Curve Cryptography over Binary Fields, C.K. Koc and C. Paar (Eds.): CHES 2000, LNCS 1965, pp. 1-24, 2000.
DSP56000 24-Bit Digital Signal Processor Family Manual, Motorola, Inc., 1995, 638 pages (Bates Nos. L08722-L09359).
Erkay Savas et al., A Scalable and Unified Multiplier Architecture for Finite Fields GF9p) and GF(2m)*, C.K. Koc and C. Paar (Eds.): CHES 2000, LNCS 1965, pp. 277-292, 2000.
Fairchild CLIPPER™ 32-Bit Microprocessor User's Manual, Prentice-Hall, Inc., Englewood Cliffs, New Jersey (1987).
Geraldo Orlando et al., A High Performance Reconfigurable Elliptic Curve Processor for GF(2m)*, C.K. Koc and C. Paar (Eds.): CHES 2000, LNCS 1965, pp. 41-56, 2000.
i860™ Microprocessor Family Programmer's Reference Manual, Intel Corporation, 1992, 79 pages (Bates Nos. L09361-L09439).
IEEE Standard for Binary Floating-Point Arithmetic, IEEE, 1985, pp. i-vi and 1-14.
Jae Wook Chung et al., Fast Implementation of Elliptic Curve Defined over GF(pm) on CalmRISC with MAC2424 Coprocessor, C.K. Koc and C. Paar (Eds.): CHES 2000, LNCS 1965, pp. 57-70, 2000.
Marc Joye et al., Efficient Generation of Prime Numbers, C.K. Koc and C. Paar (Eds.): CHES 2000, LNCS 1965, pp. 340-354, 2000.
Souichi Okada et al., Implementation of Elliptic Curve Cryptographic Coprocessor over GF92m) on an FPGA, C.K. Koc and C. Pear (Eds.): CHES 2000, LNCS 1965, pp. 25-40, 2000.
TMS320C1x1C2x1C2xx1C5x Assembly Language Tools User's Guide, Texas Instruments, Mar. 1995, 483 pages (Bates Nos. L07916-L08398).
TMS320C5x General-Purpose Applications User's Guide, Texas Instruments, Jul. 1997, 167 pages (Bates Nos. L08399-L08565).
VIS™ Instruction Set User's Manual, Sun Microsystems, Inc., 1997, pp. i-xii and 1-136.
Walter Hollingsworth et al., “The Clipper Processor: Instruction Set Architecture and Implementation,” Communications of the ACM, vol. 32, No. 2, pp. 200-219, ACM, Feb. 1989.
Zhijie Shie et al., Bit Permutation Instructions for Accelerating Software Cryptography, Proceedings of the IEEE Internation Conference on Application-Specific Systems, Architectures and Processors, Jul. 10-12, 2000, Boston, Massachusetts, USA, pp. 138-148.
Hays, Pat, LX5280 High-Performance RISC-DSP for IP Licensing, at http://www.lexra.com/presentation/, 27 pages (Jun. 8, 1999).
Intersil Data Sheet, “HS-RTX2010RH: Radiation Hardened Real Time Express Microcontroller,” [online] Mar. 2000, [Retrieved on Feb. 16, 2006]. Retrieved from the Internet: <URL: httpl://www.intersil.com/data/fn/fn3961.pdf> (36 pages).
Kato, T. et al., “A Design for Modular Exponentiation Coprocessor in Mobile Telecommunication Terminals,” in Proceedings of Second International Workshop on Cryptographic Hardware and Embedded Systems. CHES 2000 (Eds., C.K. Koc, and C. Paar), Worcester, Massachusetts, USA, Aug. 17-18, 2000, pp. 216-228, Springer-Verlag, Berlin/Heidelberg, Germany (2000).
LX4180, at http://www.lexra.com/lx4180.html, Lexra Inc., 9 pages (Copyright 1998-1999).
Peleg, A., and Weiser, U., “MMX Technology Extension to the Intel Architecture,” IEEE Micro, IEEE, Aug. 1996, pp. 42-50 (Bates Nos. L07222-L07230).
Piccolo—The ARM Signal Processing Architecture, at http://calab.cs.pusan.kr/TechnicalReport . . . , 12 pages (visited Mar. 6, 2001).
Texas Instruments Application Report, “The MSP430 Harware Multiplier, Functions and Applications,” [online] Apr. 1999, [Retrieved on Feb. 16, 2006] Retrieved from the Internet: <URL: http://focus.ti.com/lit/an/slaa042.pdf> (34 pages).
Turley, J., “TI's New C6x DSP Screams at 1,600 MIPS,” Microprocessor Report, Feb. 17, 1997, pp. 14-17.
Wikibooks article, “Data Coding Theory/Modulo-2 Arithmetic”, author unknown, retrieved Jul. 30, 2008, 2 pages.
Wikipedia article, “Finite field arithmetic”, www.wikipedia.com, author unknown, retrieved Jul. 30, 2008, 4 pages.
Yarlagadda, Krishna, “Lexra Adds DSP Extensions,” Microprocessor Design Resources, Inc., vol. 13, Issue 11, Aug. 23, 1999, pp. 19-21 (printed from West database, 6 pages).
601 First Silicon, at http://www.mot.com/SPSPowerPC/library/press—releases/601—First—Silicon.html, 2 pages (Oct. 1, 1992).
An Introduction to Thumb™, Version 2.0, Advanced RISC Machines, Mar. 1995, 29 pages.
AN1214: MC881 10 64-bit External Bus Interface to 16-bit EPROM, at http://www.mot-sps.com/lit/html/anL214.html, 1 page (Jan. 24, 1997).
Can Silicon Stop the Smartcard Hackers? Electronic Times, Feb. 15, 1999, available in Electronics Times 321999 WL 9348105 (2 pages).
Case, B., “Superscalar Techniques: SuperSPARC vs. 88110”, Microprocessor Report, vol. 5, No. 22, Dec. 4, 1991, pp. 1 and 6-11.
Certification Report BSI-DSZ-CC-0203-2003 for Philips Smart Card Controller P16WX064VOC [online]. Philips Semiconductors GmbH [Retrieved on Feb. 1, 2006]. Retrieved from the Internet: <URL: http://www.bsi.bund.de/zertifiz/zert/reporte/0203a.pdf>.
Clavier, C. et al., “Differential Power Analysis in the Presence of Hardware Countermeasures,” in Proceedings of Second International Workshop on Cryptographic Hardware and Embedded Systems, CHES2000 (Eds., C.K. Koc and C. Paar), Worcester, Massachusetts, USA, Aug. 17-18, 2000, pp. 252-263 Springer-Verlag, Berlin/Heidelberg, Germany (2000).
European Search Report from European Appl. No. EP 02 71 7430, dated Feb. 16, 2006, 3 pages.
Coron, J.-S. and Goubin, L., “On Boolean and Arithmetic Masking Against Differential Power Analysis,” in Proceedings of Second International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2000 (Eds., C.K. Koc and C. Paar), Worcester, Massachusetts, USA, Aug. 17-18, 2000, pp. 231-237, Springer-Verlag, Berlin/Heidelberg, Germany (2000).
Daemen, J. et al., “Bitslice Ciphers and Power Analysis Attacks,” presented at Fast Software Encryption Workshop 2000, New York, New York, USA, Apr. 10-12, 2000 (16 pages).
Dhem, J.F and Feyt, N., “Hardware and Software Symbiosis Helps Smart Card Evolution” [online]. IEEE Micro, Nov.-Dec. 2001, pp. 14-25 [Retrieved on Feb. 1, 2006]. Retrieved from the Internet: <URL: http://www.it.iitb.ac.in/˜satish/Thesis%20Report%20New%201/2Review%20of%20literature/2—reference/2—29—Hardware%20and%20software%20symbiosis%20helps%20smart%20card%20evolution.pdf>.
Dhem, J.F and Feyt, N., “Present and Future Smart Cards” [online]. Gemplus—Card Security Group, pp. 1-9 [Retrieved on Feb. 1, 2006]. Retrieved from the Internet: <URL: http://www.it-c.dk/courses/DSKJF2003/smart2.pdf>.
Diefendorff, K., “The 88110: A Superscalar Microprocessor with Graphics Support” (Motorola), Microprocessor Forum, Nov. 1991, 20 pages (Bates Nos. L00622-00641).
Dieffendorff, K., and Allen, M., “Organization of the Motorola 88110: A Superscalar RISC Microprocessor,” Motorola Inc., date unknown, 12 pages (Bates Nos. L00642-L00653).
Digital Equipment Corporation, VAX 11/780 Architecture Handbook, 1977, pp. 6-26, 6-27, 6-30, 6-31.
Drescher, W., and Fettweis, G., “VLSI Architectures for Multiplication in GF(2m) for Application Tailored Digital Signal Processors,” in VLSI Signal Processing, IX, San Francisco, California, USA (Oct. 30-Nov. 1, 1996), IEEE, Piscataway, New Jersey, USA, pp. 55-64.
Drescher, W., et al., “VLSI Architecture for Datapath Integration of Arithmetic Over GF(2m) on Digital Signal Processors,” in IEEE International Conference on Acoustics, Speech, and Signal Processing, Munich, Germany (Apr. 21-24, 1997), IEEE, Los Alamitos, California, USA, pp. 631-634.
DSP56002 24-Bit Digital Signal Processor User's Manual, Motorola, Inc., 1995, 386 pages (Bates Nos. L07277-L07662).
DSP56002 Semiconductor Technical Data, Motorola, Inc., 1996, 110 pages (Bates Nos. L07803-L07912).
DSP56002/DSP56L002 Motorola Semiconductor Product Information, Motorola, Inc., 1994, 3 pages (Bates Nos. L07913-L07915).
EB162: Programming Tips (MC88110), at http://www.mot-sps.com/lit/html/eb162.html, 1 page (Jan. 24, 1997).
English language abstract for Japanese Patent Publication No. 11-003226 titled “Visual Instruction Set for CPU Having Integrated Graphics Function,” inventor Robert Yung, published Jan. 6, 1999.
English language abstract for Japanese Patent Publication No. 11-174955 titled “Open Key Ciphering Device, Open Key Ciphering and Deciphering Device, and Deciphering Program Recording Medium,” inventors Uchiyama et al., published Jul. 2, 1999.
English language abstract for Japanese Patent Publication No. 2000-293507 titled “Device and Method for Generating Expression Data in Operation of Finite Field,” inventor Atsushi Kogure, published Oct. 20, 2000.
English language abstract for Japanese Patent Publication No. 2000-321979 titled “Polynomial Arithmetic Device, Device for Calculating Order of Elliptic Curve, Device for Generating Elliptic Curve, and Cryptographic System for Elliptic Curve,” inventor Yuichi Fuda, published Nov. 24, 2000.
European Search Report cited in Application No. 02706275.1-2212 / 1386224 dated Oct. 23, 2008.
Eyre, J., et al., “Infineon's TriCore Tackles DSP,” Microprocessor Report, Apr. 19, 1999, pp. 12-14.
Feigel, C.P., “TI Introduces Four-Processor DSP Chip,” Microprocessor Report, Mar. 28, 1994, pp. 22-25.
Galois Filed Arithmetic Library, www.partow.net/projects/galois/ Jan. 2, 2006, 4 pages.
Gwennap, L., “Digital, MIPS Add Multimedia Extensions,” Microprocessor Report, MicroDesign Resources, vol. 10, No. 15, Nov. 18, 1996, pp. 1-5.
Gwennap, L., “Intel's MMX Speeds Multimedia,” Microprocessor Report, MicroDesign Resources, vol. 10, No. 3, Mar. 5, 1996, 6 pages.
Gwennap, L., “New Multimedia Chips to Enter the Fray,” Microprocessor Report, MicroDesign Resources, vol. 10, No. 13, Oct. 1996, p. 9.
Gwennap, L., “UltraSparc Adds Multimedia Instructions,” Microprocessor Report, MicroDesign Resources, vol. 8, No. 16, Dec. 5, 1994, pp. 1-3.
Halfhill, T.R. and Belgard, R., “Mips vs. Lexra: Definitely Not Aligned,” Microprocessor Report, vol. 13, No. 16, Dec. 6, 1999, pp. 1-5.
Hansen, Craig, “Architecture of a Broadband Mediaprocessor,” COMPCON96, Feb. 25-29, IEEE, 1996, 8 pages (Bates Nos. L00654-L00661).
Hardware Implications of xmeni as a st followed by a ld, Motorola Semiconductor Engineering Bulletin, Motorola, Sep. 1992, 5 pages.
Hasan, M. Anwar, “Power Analysis Attacks and Algorithmic Approaches to their Countermeasures for Koblitz Curve Cryptosystems,” in Proceedings of Second International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2000 (Eds., C.K. Koc and C. Paar), Worcester, Massachusetts, USA, Aug. 17-18, 2000, pp. 93-108, Springer-Verlag, Berlin/Heidelberg, Germany (2000).
Heinrich, J., MIPS R4000 Microprocessor User's Manual, Second Edition, MIPS Technologies, Inc., 1994, pp. 154-155, 157,159, 161, 168, 170-171, B-9, B-M, B-13, B-17, B19, B-2I, B-23, B-27, B-38, B-40, and B-62.
IBM Technical Disclosure Bulletin, “Pipelined Hardware Multiplier with Extended Precision,” vol. 23, Issue 9, pp. 4322-4323 (Feb. 1, 1981) (5 pages).
Interrupt Latency in the MC8110, Motorola Semiconductor Engineering Bulletin, Motorola, 1992, pp. 1, 2 and 4-9.
K.H. Leung, et al., “FPGA Implementation of a Microcoded Elliptic Curve Cryptographic Processor,” IEEE, 2000, pp. 68-76.
Killian, E., “MIPS Extensions for Digital Media,” Microprocessor Forum, Oct. 22-23, 1996, pp. 1-5.
Koc, C. K., and Acar, T., Fast Software Exponentiation in GF(2k), Proceedings of the 13th IEEE Symposium on Computer ,Arithmetic, Jul. 6-9, 1997, pp. 225-231.
Koc, C.K. and Acar, T., “Montgomery Multiplication in GF(2k), ” Proceedings of Third Annual Workshop on Selected Areas in Cryptography, pp. 95-106, Queens University, Kingston, Ontario, Canada, Aug. 15-16, 1996 (13 pages).
Kocher, P. et al., “Differential Power Analysis,” in Advances in Cryptology—Proceedings of 19th Annual International Cryptology Conference, CRYPTO '99 (Ed. Michael I. Wiener), Santa Barbara, California, USA, Aug. 15-19, 1999, Springer-Verlag, Berlin/Heidelberg, Germany (1999) pp. 388-397.
Kutler, Jeffrey, Smart Cards: Even Abundant Security Features Don't Spur Smart Card Buy-I, American Banker, vol. 163, No. 221, Nov. 18, 1998, available in Am. Banker 11998 WL 13326041 (3 pages).
Lee, Ruby, “Accelerating Multimedia with Enhanced Microprocessors,” IEEE Micro, IEEE, Apr. 1995, pp. 22-32 (Bates Nos. L08566-L08576).
Lexra [Products] , at http://www.lexra.com/lx-products2.html, 2 pages (Copyright 1998-1999).
Lexra Announces Industry's First RISC-DSP Core Based on MIPS® Instruction Set Architecture, at http://www.lexra.com/pr—990505.html, 3 pages (May 5, 1999).
Lexra Announces its LX4080 Evaluation System is Proven and Available for Production, at http://www.lexra.com/pr—980720.html, 2 pages (Jul. 20, 1998).
Lexra Announces LX4080 Embedded RISC Processor Core, Delivering High Performance &executes MIPS-I instructions set*, at http://www.lexra.com/pr980112.html, 2 pages (Jan. 12, 1998).
Lexra Announces LX4080 SmoothCore™ Silicon Proven RISC Core, at http://www.lexra.com/pr—980323.html, 3 pages (Mar. 23, 1998).
Lexra Announces Next Generation Embedded RISC Core, at http://www.lexra.com/pr—990111.html, 3 pages, (Jan. 11, 1999).
Lexra Announces the Fastest 32-Bit RISC Core to Execute MIPS® Instructions*, at http://www.lexra.com/pr—990719.html, 2 pages (Jul. 19, 1999).
Lexra Announces the First Mainstream 32-bit RISC Core in a Programmable Logic Device, at http://www.lexra.com/pr—981005.html, 3 pages (Oct. 5, 1998).
Lexra ASYM-L XSimulator/FIR Filter Demo, date unknown, 5 pages.
Lexra ASYM-LX Instruction Set Simulator Product Brief, date unknown, 2 pages.
Lexra Command Line User Environment (CLUE) for ASYM-LX User's Guide, Revision 1.1, Jan. 28, 2000, pp. 1-32.
Lexra Rolls Out Second MIPS Core (Lexra LX4180) (Product Announcement), Microprocessor Report, Jan. 28, 1999, 1 page (printed from West database).
Lijun Gao, Sarvesh Shrivastava, Hanbo Lee, Gerald E. Sobelman, A Compact Fast Variable Size Elliptic Curve Cryptosystem Coprocessor, Proc. of the 7th Annual IEEE Symposium on Field-Programmable Custom Computing Machines, Apr. 21-23, 1999, pp. 304-305.
LX4080, at http://www.lexra.com/lx4080.html, 8 pages (Copyright 1998-1999).
LX4080P, at http://www.lexra.com/lx4080p.html, 6 pages (Copyright 1998-1999).
LX4280 Fills Lexra's Midrange (MIPS-compatible embedded processor core) (Product Announcement), Microprocessor Report, Aug. 2, 1999, 1 page (printed from West database).
LX4280, at http://www.lexra.com/lx4280.html, 2 pages (Copyright 1998-1999).
LX5280, at http://www. lexra.com/lx5280.html, 2 pages (Copyright 1998-1999).
Marketing literature from Philips Semiconductors, “On the Move—Philips Semiconductors and IBM Research to Co-develop Secure Smart Cards” [online]. Feb. 1999, Document order No. 9397.750.05157, [Retrieved on Feb. 1, 2006]. Retrieved from the Internet: <URL:http:/www.semiconductors.philips.com/acrobat download/literature/9397/75005157.pdf5.
Mayer-Sommer, R., “Smartly Analyzing the Simplicity and the Power of Simple Power Analysis on Smartcards,” in Proceedings of Second International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2000 (Eds., C.K. Koc, and C. Paar), Worcester, Massachusetts, USA. Aug. 17-18, 2000, pp. 78-92, Springer-Verlag, Berlin/Heidelberg, Germany (2000).
MC88110/410DH/AD: MC88410/MC88410 Designer's Handbook, at http://www.mot-sps.com/lit/html/mc88110410dhad.html, 1 page (Jan. 24, 1997).
MC88110UM/AD: MC88110 Second Generation RISC Microprocessor User's Manual, at http://www.mot-sps.com/lit/html/mc88110umad.htrnl, 1 page (Jan. 24, 1997).
MC88410UM/AD: MC88410 Secondary Cache Controller User's Manual, at http://www.mot-sps.com/lit/html/mc88410umad.html, 1 page (Jan. 24, 1997).
Microprocessor Devices Reliability Monitor Report: Fourth Quarter 1997, Motorola, 10 pages (1997).
Microprocessor Devices Reliability Monitor Report: Third Quarter 1997, Motorola, 8 pages (1997).
MIPS Technologies, Inc. Files Lawsuit to Protect Intellectual Property Rights, at http://www.mips.com/pressReleases/102899B.html, 2 pages (Oct. 28, 1999).
MIPS Technologies, Inc. Litigation Overview and Q&A, at http://www.mips.com/pressReleases/102899D.htm1, 3 pages (visited Feb. 24, 2000).
MIPS: Open Letter from John Bourgoin, CEO, MIPS Technologies, at http://www.mips.com/pressReleases/102899C.html, 2 pages (visited Feb. 24, 2000).
Naccache, D. and Tunstall. M. “How to Explain Side-Channel Leakage to Your Kids.” In Proceedings of Second International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2000 (Eds., C.K. Koc and C. Paar), Worcester, Massachusetts. USA, Aug. 17-18, 2000, pp. 229-230 Springer-Verlag, Berlin/Heidelberg, Germany (2000).
Patent Abstracts of Japan, Publication No. JP11203106 (Jul. 30, 1999), English Language Abstract for JP Patent Application No. JP19980005096 (Jan. 13, 1998).
Patent Abstracts of Japan, Publication No. JP4142618 (May 15, 1992), English Language Abstract for JP Patent Application No. JP19900264991 (Oct. 4, 1990).
Patent Abstracts of Japan, Publication No. JP61223938 (Oct. 4, 1986), English Language Abstract for JP Patent Application No. JP19850063782 (Mar. 29, 1985).
Patent Abstracts of Japan, Publication No. JP8314717 (Nov. 29, 1996), English Language Abstract for JP Patent Application No. JP19960146619 (May 16, 1996).
Patent Abstracts of Japan, Publication No. JP2003533829T (Nov. 11, 2003), English Language Abstract for JP Patent Application No. JP20010585439T (May 7, 2001).
Philips Semiconductors Short Form Specification, “P16WX064 SmartXA-Family, Secure 16-bit Smart Card Controller,” Revision 1.1 [online], Feb. 2001, pp. 1-11 [Retrieved on Feb. 1, 2006]. Retrieved from the Internet: <URL: http://www.semiconductors.philips.com/acrobatdownload/other/identification/sfs052411.pdf>.
QML-DSP/MCM and Die Courier,at http://www.ti.com/sc/docs/military/liter/ecour/dsp.htp, 7 pages (Jan. 1996).
Reliability and Quality Report 3Q97, Motorola, 1997, 2 pages.
Reliability and Quality Report 4Q97, Motorola, 1997, 2 pages.
Reliability Monitor Environmental Stress Data 3Q97, Motorola, 1997, 4 pages.
Running the MC88110 in Lockstep, Motorola Semiconductor Engineering Bulletin, Motorola, 1992, 2 pages.
Security Target BSI-DSZ-CC-0203, Version 1.1, Jan. 24, 2003, valuation of the Philips PI6WX064VOC Secure 16-bit Smart Card Controller [online]. Philips Semiconductors GmbH, pp. 1-74 [Retrieved on Feb. 1, 2006]. Retrieved from the Internet: <URL: htto://www.commoncriteriaportal.org/public/files/epfiles/0203b.pdf>.
Shamir. A., “Protecting Smart Cards from Passive Power Analysis with Detached Power Supplies,” in Proceedings of Second International Workshop on Cryptographic Hardware and Embedded Systems. CHES 2000 (Eds., C.K. Koc and C. Paar), Worcester, Massachusetts, USA, Aug. 17-18, 2000, pp. 71-77, Springer-Verlag, Berlin/Heidelberg, Germany (2000).
Shi, Z., et al., “Bit Permutation Instructions for Accelerating Software Cryptography,” Proceedings of the IEEE International Conference on Application-specific Systems, Architectures and Processors, pp. 138-148, Boston, MA (Jul. 10-12, 2000).
STMicroelectronics and Gemplus Announce Smart Card Security Certification Including Hardware and Software, EDP Weekly's IT Monitor, vol. 42, Issue 13, Apr. 2, 2001, available in EDP Wkly. 42001 WL 14018034 (3 pages).
STMicroelectronics and Gemplus Announce Smart Card Security Certification Including Hardware and Software. Business Wire, Mar. 29, 2001, available in Westlaw, Mar. 29, 2001 Bus. Wire 02:05:00 (3 pages).
Tanenbaum, A.S., Structured Computer Organization, Prentice-Hall, Inc. 1984, pp. 10-12.
TMS32010 User's Guide, Texas Instruments Incorporated, 1983, p. 1183.
TMS320C80 Digital Signal Processor, Texas Instruments, Jul. 1984, 5 pages.
Turley, J., “Siemens TriCore Revives CISC Techniques,” Microprocessor Report. MicroDesign Resources, Nov. 17, 1997, pp. 13-16.
Vollmer, A., Security ICs Are Targeting Consumer Applications, Electronic Design, vol. 48, Issue 23, Nov. 6, 2000, available in Electronic Design 1052000 WL 14003957 (13 pages).
Weingart, S.H., “Physical Security Devices for Computer Subsystems: A Survey of Attacks and Defenses,” in Proceedings of Second International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2000 (Eds., C.K. Koc and C. Paar), Worcester, Massachusetts, USA, Aug. 17-18, 2000, pp. 302-317, Springer-Verlag, Berlin/Heidelberg, Germany (2000).
Weiss, R., ARM Piccolo Mixes ARM RISC with DSP, at http://ww.estd.com/Editorial/1996/11/Briefs/arm.html, 1 page (Nov. 1996).
El-Sharkawy, Mohammed, Ph.D., Digital Signal Processing Applications with Motorola's DSP56002 Processor, Prentice Hall PTR, 1996, pp. 43-124 (Bates Nos. L06519-L06601).
Digital Equipment Corporation, VAX 11/780 Architecture Handbook, 1977, pp. 6-39 to 6-41.
“Galois Field Polynomial Generator Function Register” TMS320C6000 CPU and Instruction Set Reference Guide, Texas Instruments, Oct. 2000, p. 2-26.
IBM Technical Disclosure Bulletin, “Bit-Manipulation Facility for a Parallel Architecture,” vol. 34, No. 7A, Dec. 1991, pp. 387-390.
Office Communication, dated May 7, 2007, for U.S. Appl. No. 11/644,001, filed Dec. 22, 2006, 6 pages.
Office Communication, dated Nov. 26, 2007, for U.S. Appl. No. 11/644,001, filed Dec. 22, 2006, 4 pages.
Office Communication, dated Jul. 28, 2008, for U.S. Appl. No. 11/644,001, filed Dec. 22, 2006, 7 pages.
Office Communication, dated Dec. 29, 2003, for U.S. Appl. No. 09/788,682, filed Feb. 21, 2001, 8 pages.
Office Communication, dated Jun. 24, 2004, for U.S. Appl. No. 09/788,682, filed Feb. 21, 2001, 5 pages.
Office Communication, dated Nov. 19, 2004, for U.S. Appl. No. 09/788,682, filed Feb. 21, 2001, 6 pages.
Office Communication, dated Jun. 27, 2005, for U.S. Appl. No. 09/788,682, filed Feb. 21, 2001, 5 pages.
Office Communication, dated Feb. 22, 2006, for U.S. Appl. No. 09/788,682, filed Feb. 21, 2001, 6 pages.
88410 Second Level Cache, Microprocessor Forum, Motorola Inc., Nov. 1991, 20 pages (Bates Nos. L00622-L00641).
Office Communication, dated Aug. 13, 2003, for U.S. Appl. No. 09/788,670, filed Feb. 21, 2001, 11 pages.
Office Communication, dated Apr. 22, 2004, for U.S. Appl. No. 09/788,670, filed Feb. 21, 2001, 12 pages.
Office Comunication, dated Feb. 23, 2005, for U.S. Appl. No. 09/788,670, filed Feb. 21, 2001, 10 pages.
Office Communication, dated Oct. 4, 2005, for U.S. Appl. No. 09/788,670, filed Feb. 21, 2001, 11 pages.
Office Communication, dated Jun. 21, 2006, for U.S. Appl. No. 09/788,670, filed Feb. 21, 2001, 12 pages.
Office Communication, dated Jan. 26, 2007, for U.S. Appl. No. 09/788,670, filed Feb. 21, 2001, 11 pages.
Office Communication, dated Aug. 9, 2007, for U.S. Appl. No. 09/788,670, filed Feb. 21, 2001, 10 pages.
Office Communication, dated Nov. 26, 2007, for U.S. Appl. No. 09/788,670, filed Feb. 21, 2001, 6 pages.
Office Communication, dated Jul. 3, 2008, for U.S. Appl. No. 09/788,670, filed Feb. 21, 2001, 5 pages.
Office Communication, dated Nov. 24, 2008, for U.S. Appl. No. 09/788,670, filed Feb. 21, 2001, 6 pages.
Office Communication, dated Jun. 25, 2004, for U.S. Appl. No. 09/788,683, filed Feb. 21, 2001, 6 pages.
Office Communication, dated Aug. 23, 2006, for U.S. Appl. No. 09/788,683, filed Feb. 21, 2001, 5 pages.
Office Communication, dated Jan. 10, 2007, for U.S. Appl. No. 09/788,683, filed Feb. 21, 2001, 6 pages.
Office Communication, dated Apr. 5, 2004, for U.S. Appl. No. 09/788,684, filed Feb. 21, 2001, 9 pages.
Office Communication, dated Nov. 23, 2004, for U.S. Appl. No. 09/788,684, filed Feb. 21, 2001, 5 pages.
Office Communication, dated Jun. 9, 2005, for U.S. Appl. No. 09/788,684, filed Feb. 21, 2001, 13 pages.
Office Communication, dated May 30, 2006, for U.S. Appl. No. 09/788,684, filed Feb. 21, 2001, 15 pages.
Office Communication, dated Feb. 7, 2007, for U.S. Appl. No. 09/788,684, filed Feb. 21, 2001, 8 pages.
Office Communication, dated Sep. 5, 2007, for U.S. Appl. No. 09/788,684, filed Feb. 21, 2001, 7 pages.
Office Communication, dated Feb. 6, 2008, for U.S. Appl. No. 09/788,684, filed Feb. 21, 2001, 8 pages.
Office Communication, dated Aug. 4, 2008, for U.S. Appl. No. 09/788,684, filed Feb. 21, 2001, 10 pages.
Office Communication, dated Aug. 12, 2002, for U.S. Appl. No. 09/788,685, filed Feb. 21, 2001, 5 pages.
Office Communication, dated Mar. 5, 2003, for U.S. Appl. No. 09/788,685, filed Feb. 21, 2001, 5 pages.
Office Communication, dated Jun. 4, 2004, for U.S. Appl. No. 09/788,685, filed Feb. 21, 2001, 5 pages.
Office Communication, dated Sep. 15, 2005, for U.S. Appl. No. 10/195,522, filed Jul. 16, 2002, 4 pages.
Office Communication, dated May 18, 2006, for U.S. Appl. No. 10/195,522, filed Jul. 16, 2002, 5 pages.
Office Communication, dated Jan. 9, 2007, for U.S. Appl. No. 10/195,522, filed Jul. 16, 2002, 5 pages.
Office Communication, dated Apr. 21, 2010, for U.S. Appl. No. 11/410,146, filed Apr. 25, 2006, 5 pages.
International Search Report, dated Sep. 13, 2002, for PCT Appl. No. PCT/US02/04414, 3 pages.
Related Publications (1)
Number Date Country
20090198986 A1 Aug 2009 US
Divisions (1)
Number Date Country
Parent 11644001 Dec 2006 US
Child 12399330 US
Continuations (1)
Number Date Country
Parent 09788682 Feb 2001 US
Child 11644001 US