Sequential Multiplier with Sub-linear Gate Complexity
|
|
- Ashlee Payne
- 5 years ago
- Views:
Transcription
1 Sequential Multiplier with Sub-linear Gate Complexity Anwar Hasan, Christophe Negre To cite this version: Anwar Hasan, Christophe Negre. Sequential Multiplier with Sub-linear Gate Complexity. [Research Report] 212, pp.12. <hal-71285> HAL I: hal Submitte on 26 Jun 212 HAL is a multi-isciplinary open access archive for the eposit an issemination of scientific research ocuments, whether they are publishe or not. The ocuments may come from teaching an research institutions in France or abroa, or from public or private research centers. L archive ouverte pluriisciplinaire HAL, est estinée au épôt et à la iffusion e ocuments scientifiques e niveau recherche, publiés ou non, émanant es établissements enseignement et e recherche français ou étrangers, es laboratoires publics ou privés.
2 Sequential Multiplier with Sub-linear Gate 1 Complexity M. Anwar Hasan an Christophe Negre Abstract In this article, we present a new sequential multiplier for extene binary finite fiels. Like its existing counterparts, the propose multiplier has a linear complexity in flip-flop or temporary storage requirements, but a sub-linear complexity in gate counts. For the unerlying polynomial multiplication, the propose fiel multiplier relies on the Horner scheme. Inex Terms Binary polynomial multiplication, sequential multiplier, Horner scheme, sub-linear gate complexity. 1 INTRODUCTION Multiplication over finite fiels is use in both symmetric an asymmetric key cryptosystems, an has been a subject of stuy, especially for its improve implementation, among many researchers as evience in their publications, see for example [8], [13], [5], [1], [14], [11], [4]. In this article, we consier a class of harware architectures for multiplication over extene binary finite fiel F 2 n. For a small size fiel like the one use in the well known symmetric key system Avance Encryption Stanar (AES) [1], multiplication can be easily realize with a simple look-up-table (LUT), where the prouct of each combination of input is pre-store, preferably in a rea-only-memory (ROM). This table base metho is however impractical for large size fiels use in moern asymmetric key cryptosystems like Elliptic Curve Cryptography (ECC) [9], [6]. Asymptotically, a look-up table for multiplication can take as much as O(n2 2n ) bits of ROM an the time elay woul be essentially equal to the table access time, which is normally a function of the table size. Techniques exist to reuce the table size at the expense of an increase number of table accesses along with logic circuits. For high spee multiplication over a large fiel, an alternative approach is to use only logic circuits or gates in some parallel way an to perform a multiplication on-the-fly, e.g., a fully bit parallel multiplier. June 26, 212 DRAFT
3 For ECC, where the value of n is only a few hunres, a practical bit-parallel multiplier woul take O(n 1+ǫ ) logic gates, where < ǫ 1, an have a time elay of O(logn) layers of gates. In constraine environments, where silicon space is of prime concern, a fully bit parallel multiplier for a large fiel is generally too big to fit the esign. On the other en of the spectrum of choices, it is possible, at least in theory, to realize a multiplier with as few as only two gates one XOR an one AND where the gates will be use repeately an many intermeiate bit-level results will nee to be store. We will refer to this type of multipliers as super-sequential, since they woul take O(n 1+ǫ ) iterations or clock cycles.the storage requirement for a super-sequential multiplier woul be at least O(n 1+ǫ ). Because of large timing an memory requirements, super-sequential multipliers are likely to be least attractive for both constraine an high spee applications an this is perhaps why no practical esign of the super-sequential multiplier has been reporte in the literature. Between the above two extremes, namely fully parallel an super-sequential multipliers, one can fin various sequential multipliers, either at bit or igit-level. A sequential multiplier operates in an iterative way over a number of clock cycles, typically O(n) cycles for bit sequential or O(n/) cycles for igit sequential architecture, where is the igit size. A bit sequential multiplier has a shorter critical path than its igit sequential counterpart. For a bit or igit sequential multiplier, since intermeiate results are store in registers or rea-write memories, the storage requirement is at least O(n) bits. Besies registers, a sequential multiplier also requires logic gates, generally in the amount of O(n), i.e., linear to n. In our work, we ifferentiate ROM from registers in the usual way. In other wors, while the content of a ROM is fixe an specific to a certain arithmetic operation, the content of a register can change. More importantly, registers are time-share, i.e., a set of registers can be use by multiple operations, for example, aitions, multiplication an inversion, provie that these operations are not execute simultaneously. On the other han, like ROM but unlike registers, most of the logic gates are assume to be specific to a certain operation an not share. As a result, even if an arithmetic unit, such as a multiplier, can be esigne to take avantage of time share registers, there is still a nee to reuce the amount of logic gates, especially for area constraine applications. In this article, we propose a new sequential multiplier. Like its existing counterparts the propose one requires O(n) bits of registers, but only O(n 1 ǫ ), < ǫ 1, logic gates. To the best of our knowlege, no sequential multiplier has been reporte earlier that has a gate count sub-linear to n. To give an iea about where the propose multiplier fits with respect to various others, in Table 1 we list their space an time complexities in an asymptotic or general way. The remainer of this article is organize as follows. In Section 2, we briefly review schemes for a fully bit parallel an a igit-sequential multiplier. In Section 3, we present our sequential multiplier which is base on the Horner metho an has a sub-linear gate complexity. Finally, a complexity comparison an 2
4 concluing remarks are given Section 4. TABLE 1 List of ifferent types of multipliers an their complexities Architecture # Logic gates or ROM cells # Flip-flops in registers Critical Path Delay # Clock Cycles Full LUT n2 2n O(n) 1 Fully parallel circuit O(n 1+ε ) O(log(n)) 1 Digit-sequential circuit O(n) O(n) O(log()) n/ Bit-sequential circuit O(n) O(n) O(1) n Propose O(n 1 ǫ ) O(n) O(log(n)) O(n) 2 REVIEW OF EXTENDED BINARY FIELD MULTIPLIERS Fiel F 2 n can be viewe as the set of binary polynomials in t moulo an irreucible polynomial P(t) of egree n. Let A(t) an B(t) be two elements of F 2 n. The multiplication of these two elements is C(t) = A(t) B(t) mo P(t), for which we can use the following two steps: C (t) = A(t) B(t), (1) an then reuce C (t) moulo P(t) to get C(t) = C (t) mo P(t). (2) 2.1 Bit parallel architectures In this type of architectures, all the bits of the prouct C = AB mo P are generate in parallel. The esign of the circuit is base on pure combinatorial logic an oes not make any use of storage or flip-flops. Computations are one with no reuse of circuits. The approach we recall here performs the polynomial multiplication (1) an the reuction (2) separately. The reuction moulo P is generally quite simple when P is sparse (i.e., P is a pentanomial or a trinomial) an in this situation the reuction operation can be implemente with O(n) XOR gates an a elay of O(1). Consequently, we will focus here to the polynomial multiplication which is the most costly an the most complicate part of a finite fiel multiplier. Quaratic multiplier. Let C = 2n 2 i= c i ti be the prouct C = A B where A an B are egree n 1 3
5 polynomials in t. The coefficients c i are given in terms of a i an b i as follows c = a b, c 1 = a b 1 +a 1 b,.. c n = a b n +a 1 b n 1 + +a n b, c n+1 = a 1 b n +a 2 b n 1 + +a n b 1,.. c 2n 3 = a n 2 b n 1 +a n 1 b n 2, c 2n 2 = a n 1 b n 1. The computation of each c i is performe in parallel with AND gates (for the proucts a l b j ) an a binary tree of XOR gates. The resulting gate complexity of this polynomial multiplier is equal to n 2 AND gates an n(n 1) XOR gates. The critical path of the multiplier is log 2 (n) D X +D A where D X an D A are elays for a two input XOR an AND gates respectively. Subquaratic multiplier [2]. A secon strategy, which was first propose in [4], is base on the metho of Karatsuba. Specifically, the multiplication is performe by applying the following formula recursively Splitting: A = A +A 1 t n/2 an B = B +B 1 t n/2, Recursive proucts: M = A B,M 1 = (A +A 1 ) (B +B ) an M 2 = A 1 B 1, Reconstruction: C = M +t n/2 (M 1 +M +M 2 )+t n M 2, As state in [4], this approach requires 6n log 2 (3) + 8n 2 XOR gates, n log 2 (3) AND gates an has a elay of 3log 2 (n)d X + D A. Recently, some optimizations have been propose: Leone in [7] has notice that it is possible to slightly reuce the space complexity of the Karatsuba multiplier if we stop the recursion when we reach polynomials of egree 4 or 8 an then apply quaratic metho. More recently, Fan et al. in [3] have propose to use an o/even splitting which reuces the elay to 2log 2 (n)d X +D A. In Table 2, we recall the complexity of the schoolbook metho an then give the complexity of multipliers base on the Karatsuba combine with the optimization approaches of Leone [7] an Fan et al. [3]. 2.2 Digit Sequential Multiplier In sequential multipliers, computations are one with reuse of circuits an the final result is obtaine over several clock cycles. Here, we review the igit sequential version of the multiplier of Song an Parhi [12]. Song an Parhi fix a igit size an efine m = n an then they rewrite the two polynomials A an 4
6 TABLE 2 Complexity of bit parallel binary polynomial multiplier architectures Metho Space Complexity Delay # XOR # AND Quaratic n 2 1 n 2 D A + log 2 (n) D X Subquaratic [3] 6n log 2 (3) 8n+2 n log 2 (3) D A +(2log 2 (n))d X Subquaratic [3] an [7] combine 13 3 nlog 2 (3) 8n nlog 2 (3) D A +(2log 2 (n) 2)D X B as follows A(t) = m 1 i= A i(t)t i with eg t A i (t) <, B(t) = m 1 i= B i(t)t i with eg t B i (t) <. The left-to-right (L-to-R) metho for igit-serial multiplication is base on the following expansion of the prouct A B mo P C = A B mo P = ((...((AB m 1 mo P)t +AB m 2 mo P)t + )t +AB 1 mo P)t +AB mo P. The previous expression results in the following L-to-R multiplication algorithm. It consists of a sequence of multiplications by t followe by the accumulation of AB i in C moulo P. Algorithm 1 Left-to-right igit sequential multiplication [12] Require: A(t) = m 1 i= A i(t)t i an B(t) = m 1 i= B i(t)t i. Ensure: C = A B C for i = m 1 to o C (t C +B i A) mo P en for Return(C) In Algorithm 1, the multiplication byt is performe by shifting the coefficients ofc. The multiplication B i A is one using m parallel quaratic space complexity polynomial multipliers of size. These igit multipliers compute the prouct B i A j for j =,...,m 1. Each prouct B i A j has egree 2 2: thus the upper part of this prouct is ae to C j+1 an the lower part to C j. Then the upate value of C has m + 1 igits, since in C m we store the upper part of the prouct B i A m 1. If we assume that 5
7 P = t m + m 1 i= P i(t)t i, then we reuce C m moulo P using the following expression C m t m = m 1 i= P i C m t i. In practical applications, P can be taken as a pentanomial or a trinomial, so the P i s are in general either equal to zero or sparse. Here, for the sake of simplicity, we will further assume that the only non-zero P i is P. This means that the reuction step consists of C m t m = P C m an can be performe with at most 3( 1) XOR gates (inee, if P is a pentanomial, then P has 4 non-zero coefficients). The resulting igit sequential multiplier is epicte in Fig. 1. The Digit Mult. boxes represent the quaratic parallel polynomial multipliers for egree polynomials. Fig. 1. Left-to-right igit sequential multiplier of [12] B,...,B m 2,B m 1 A m 1 A m 2 A 1 A Digit Mult. Digit Mult. Digit Mult. Digit Mult C m 1 C m 2 C 1 C 1 Mult. by P The complexity of this igit sequential multiplier is given below. Note that S represents the number of XOR gates, S represents the number of AND gates an D represents the elay of the critical path of the architecture. We remark that the total computational elay is the number of clock cycles times the clock perio, whose uration is at least the critical path elay. S = m( 2 + 1)+5 4, S = m 2, D = log 2 ()+5 D X +D A, #Flip-flops = 3m, # Clock cycles = m. Remark 1: We have restricte our stuy to a quite specific P but in general when P has egree n an is a pentanomial, a similar approach can be applie with no aitional significant complexity. Our choice was motivate only by the simplicity of this special case in the igit sequential esign. 6
8 3 SUB-LINEAR GATE COMPLEXITY USING HORNER S METHOD In this section, we present a multiplier with sub-linear gate complexity base on the Horner metho. Our approach takes avantage of a subquaratic multiplier as well as a igit sequential multiplier. As before, let A(t) an B(t) be two polynomials of egree < n. Let m an be two integers such that m = n. We rewrite A an B in a igit form as follows: A(t) = m 1 i= A i(t)t i with eg t A i (t) < B(t) = m 1 i= B i(t)t i with eg t B i (t) < We multiply A an B using Horner s metho. Here we assume that the irreucible polynomial P has the form P = X m +P where P has a egree less than an has at most four non-zero coefficients. This assumption is not restrictive, a similar multiplier with the same orer of area an elay complexity can be esigne with a more general pentanomial P. The resulting metho is escribe in Algorithm 2 an uses the Left-to-Right approach. We have exhibite all the m 2 igit multiplications an we have separate the operations C +A j B i t j, j < m 1 an i < m, from the operations t (C +A m 1 B i t (m 1) ) mo P an (C +A m 1 B i t (m 1) ) mo P which involve reuction moulo P. The architecture base on Algorithm 2 is shown in Fig. 2. In this architecture, elements A an B are each store in a register of m cells, each cell containing bits. The prouct C is also store in a register of m cells an is initialize with m zeros. Registers containing A an C are shifte cyclically once in every clock cycle. On the other han, B is shifte once after every m clock cycles. At each clock cycle one of the following cases is performe an in Fig. 2 these three cases are inicate in re, blue an green.: Case 1 (Re). A igit A j for j < m 1 is output from the A register an the igit B i is output from B. The A an C registers are left shifte but no shift is operate in the B register. The two igits A j an B i are multiplie in the igit multiplier. Then the ata follows the blue lines. This correspons to the aition of A j B i to C j an the result moves in the right most cell of the C register. The carry of A j B i is ae to C j+1 an the result is store in the left most cell of C. Case 2 (Blue). The igit A m 1 an B i are output from A an B respectively. The A register is left shifte an theb register is right shifte, but no left shifts are applie to thec register. The two igits A m 1 an B i are multiplie an then, the ata follows the re paths. The operation correspons to the multiplication by t an the computation of ((C m 1 +A m 1 B i )t m mo P). Case 3 (Green). This is the last step before the output of the prouct C. At this step, the C register is left shifte. The igits A m 1 an B are output from the A an B registers an then multiplie through the igit multiplier. Then the lower part of the prouct is ae to C m 1 an the upper part is reuce moulo P, i.e., is multiplie by P an ae to C an C 1. 7
9 Algorithm 2 Horner s metho with reuction moulo P Require: A = m 1 j= Ajtj,B(t) = m 1 i= Biti in F 2[t] with ega(t),egb(t) < n an ega j,egb i < Ensure: C = A B C for i = m 1 to 1 for j = to m 2 en for U L +t U H A jb i, C j C j +U L,C j+1 C j+1 +U H temp C m 1 for j = m 1 to 3 Case 1: Comp. of C +( m 2 j= Ajtj )B i C j C j 1 en for U L +t U M +t 2 U H (temp+a mb i) P C 2 C 1 +U H, C 1 C +U M, C U L en for for j = to m 2 U L +t U H A jb C j C j +U L, C j+1 C j+1 +U H en for U L +t U H B m 1A C m 1 C m 1 +U L V L +t V H U H P C = C +V L,C 1 = C 1 +V H return(c) Case 2: Comp. of (C +A m 1t (m 1) B i) t mo P Case 1: Comp. of C +( m 2 j= Ajtj )B Case 3: Comp. of (C +A m 1t (m 1) B ) mo P To avoi any confusion between Case 2 an Case 3, in Fig. 2 we have use two Mult. by P boxes which perform a multiplication by P in the two istinct paths. The main ifferences between Algorithm 1 an Algorithm 2 an their respective architectures are the following: 1) in Algorithm 2 an in the corresponing architecture in Fig. 2, the igit multiplications are one in sequence an not through m parallel igit multipliers. 2) In the propose multiplier, the igit multiplication uses a subquaratic multiplier, an the igit size in Fig. 2 is generally larger than the one in Fig. 1. In Fig. 3, we illustrate the functioning of the propose multiplier by presenting the first four cycles of the sequential multiplier for n = 32. Complexity evaluation. Below we list, along with a brief explanation, the number of flip-flops, AND gates 8
10 Fig. 2. Sub-linear sequential multiplier base on the Horner metho B B m 2 B m 1 Digit Multiplier A m 1 A 1 A H L re re re L M H Mult. byp re re re re blue green C C 1 blue C 2 C 3 C 4 C m 2 C m 1 green green H green green Mult. byp L blue blue green an XOR gates an the critical path of the architecture in terms of m an. For the sake of simplicity, we assume that each path in Fig. 2 is of with. 3m cells of bits each for A, B an C. Thus, the architecture in Fig. 2 requires 3m flip flops in total. The number of AND gates is equal to S () which is the number of AND gates of the igit multiplier. The number of XOR gates is equal to S ()+5, where we have counte the following: the XOR gates of one multiplier of size, five aers of size, an XORs for the two multiplications by P. The architecture in Fig. 2 also requires one 1:2 an three 1:3 emultiplexers, an one 2:1 multiplexer where each input/output is bits wie. The critical path elay is equal to D()+4D X +D A where D() is the elay of the igit multiplier. The number of clock cycles is equal to m 2. Using the subquaratic complexity results base on [3] an [7] as given in Table 2, we obtain the 9
11 Fig. 3. First four steps of the multiplication of A = (t + 1) + (t + 1) t 24 an B = t + t 7 t 24 moulo P = t 4 8 +t 7 +t 6 +t+1 with m = 4 an = 32 (note that after the emultiplexer, the followe paths are inicate with bol lines) A = t+1 B = t 7 A1 = B = t 7 Digit Mult. 1 t 7 Digit Mult. Mult. by P Mult. by P C1 C2 C3 C C2 C3 C C1 1 t 7 t 7 1 Mult. by P Mult. by P (a) Step 1. Case 1 applies an the ata follows the re paths. A2 = B = t 7 (b) Step 2. Case 1 applies an the ata follows the re paths. A1 = t+1 B = t 7 Digit Mult. Digit Mult. Mult. by P t 7 t 7 +t 6 +t 2 +t+1 Mult. by P 1 t 7 1 t 7 C3 C C1 t 7 1 C2 C C1 C2 C3 t 7 t 6 +t 2 +t+1 1 Mult. by P Mult. by P (c) Step 3. Case 1 applies an the ata follows the re paths. () Step 4. Case 2 applies (blue paths). In this step, the prouct A 3 B = (t 8 + t 7 ) is multiplie by P. The result is t 15 + t 13 + t 1 + t 9 + t 8 + t 7 = t 7 + (t 7 + t 6 + t 2 +t+1)t 8 + t 16. following complexity for the multiplier in Fig. 2 #XOR = 13 3 log 2 (3) +3+2, #AND = 16 9 log 2 (3), #Flip-flops = 3m, Delay = (2log 2 ()+2)D X +D A, #Clock cycles = m 2. (3) 1
12 4 COMPLEXITY COMPARISON AND CONCLUSION We finally obtain a sub-linear gate complexity by fixing the value of an m as = n an m = n. The resulting complexity is given in Table 3. In the same table, we recall the complexity of the igit sequential multiplier of Song an Parhi [12] reviewe earlier in Section 2 (for which we assume that m = n/). TABLE 3 Comparison with the propose sequential multiplier Architecture # AND # XOR #FFs Critical # Clock Overall elay Path Delay Propose 1.77n n n+2 3n (log 2 (n)+4)d X +D A n n((log 2 (n)+2)d X +D A ) Song an Parhi [12] n n(+1 1 )+5 4 3n log 2 ()+5 D X +D A n cycles n( log 2 ()+5 D X +D A ) The results in Table 3 suggest that the propose sequential multiplier has a gate count which is much smaller than that of the multiplier of [12]. On the other han, the propose multiplier has a longer critical path resulting in a much larger overall elay. Thus the propose sub-linear gate complexity multiplier offers a new area-time trae-off. For example, if we consier n = 256 (i.e, = m = 16), the multiplier of [12] woul require 8596 XORs, 8192 ANDs, 16 clock cycles with 9 levels of gates on the critical path, whereas the corresponing values of the propose multiplier are 397 XORs, 143 ANDs, 256 clock cycles an 11 levels of gates. REFERENCES [1] J. Daemen an V. Rijmen. The Design of Rijnael: AES - The Avance Encryption Stanar. Springer Verlag, 22. [2] H. Fan an M. A. Hasan. A New Approach to Sub-quaratic Space Complexity Parallel Multipliers for Extene Binary Fiels. IEEE Trans. Computers, 56(2): , September 27. [3] Haining Fan, Jiaguang Sun, Ming Gu, an Kwok-Yan Lam. Overlap-free karatsuba-ofman polynomial multiplication algorithms. Cryptology eprint Archive, Report 27/393, 27. [4] G. Guajaro, T. Guneysu, C. Paar,, S. Kumar, an J. Pelzl. Efficient Harware Implementation of Finite Fiels with Applications to Cryptography. Acta Applicanae Mathematicae, 93(1-3):75 118, September 26. [5] M. A Hasan, M. Wang, an V. K. Bhargava. A Moifie Massey-Omura Parallel Multiplier for a Class of Finite Fiels. IEEE Trans. Computers, 42(1): , [6] N. Koblitz. Elliptic curve cryptosystems. Mathematics of Computation, 48:23 29, [7] M. Leone. A New Low Complexity Parallel Multiplier for a Class of Finite Fiels. In Proceeings of CHES 1, pages 16 17, Lonon, UK, 21. Springer-Verlag. [8] E. Mastrovito. VLSI Designs for Multiplication over Finite Fiels F (2 m ). In 6th International Conference on Applie Algebra, Algebraic Algorithm an Error-Correcting Coes (AAECC-6), pages , [9] V. Miller. Use of elliptic curves in cryptography. In Avances in Cryptology, proceeing s of CRYPTO 85, volume 218 of LNCS, pages Springer-Verlag,
13 [1] C. Paar. A New Architecture for a Parallel Finite Fiel Multiplier with Low Complexity Base on Composite Fiels. IEEE Trans. Comput., 45(7): , [11] A. Reyhani-Masoleh. A New Bit-Serial Architecture for Fiel Multiplication Using Polynomial Bases. In CHES 28, pages 3 314, 28. [12] L. Song an K. K. Parhi. Low-Energy Digit-Serial/Parallel Finite Fiel Multipliers. J. VLSI Signal Process. Syst., 19(2): , [13] B. Sunar an C. Koc. Mastrovito Multiplier for All Trinomials. IEEE Trans. Computers, 48(5): , [14] M. Wang an I. F. Blake. Bit serial multiplication in finite fiels. SIAM J. Discret. Math., 3(1):14 148,
Efficient Subquadratic Space Complexity Binary Polynomial Multipliers Based On Block Recombination
Efficient Subquadratic Space Complexity Binary Polynomial Multipliers Based On Block Recombination Murat Cenk, Anwar Hasan, Christophe Negre To cite this version: Murat Cenk, Anwar Hasan, Christophe Negre.
More informationA New Bit-Serial Architecture for Field Multiplication Using Polynomial Bases
A New Bit-Serial Architecture for Field Multiplication Using Polynomial Bases Arash Reyhani-Masoleh Department of Electrical and Computer Engineering The University of Western Ontario London, Ontario,
More informationLow complexity bit-parallel GF (2 m ) multiplier for all-one polynomials
Low complexity bit-parallel GF (2 m ) multiplier for all-one polynomials Yin Li 1, Gong-liang Chen 2, and Xiao-ning Xie 1 Xinyang local taxation bureau, Henan, China. Email:yunfeiyangli@gmail.com, 2 School
More informationSubquadratic space complexity multiplier for a class of binary fields using Toeplitz matrix approach
Subquadratic space complexity multiplier for a class of binary fields using Toeplitz matrix approach M A Hasan 1 and C Negre 2 1 ECE Department and CACR, University of Waterloo, Ontario, Canada 2 Team
More informationFPGA accelerated multipliers over binary composite fields constructed via low hamming weight irreducible polynomials
FPGA accelerated multipliers over binary composite fields constructed via low hamming weight irreducible polynomials C. Shu, S. Kwon and K. Gaj Abstract: The efficient design of digit-serial multipliers
More informationA new class of irreducible pentanomials for polynomial based multipliers in binary fields
Noname manuscript No. (will be inserted by the editor) A new class of irreducible pentanomials for polynomial based multipliers in binary fields Gustavo Banegas Ricardo Custódio Daniel Panario the date
More informationHigh Performance GHASH Function for Long Messages
High Performance GHASH Function for Long Messages Nicolas Méloni, Christophe Negre, M. Anwar Hasan To cite this version: Nicolas Méloni, Christophe Negre, M. Anwar Hasan. High Performance GHASH Function
More informationArithmetic Distributions of Convergents Arising from Jacobi-Perron Algorithm
Arithmetic Distributions of Convergents Arising from Jacobi-Perron Algorithm Valerie Berthe, H Nakaa, R Natsui To cite this version: Valerie Berthe, H Nakaa, R Natsui Arithmetic Distributions of Convergents
More informationSubquadratic Computational Complexity Schemes for Extended Binary Field Multiplication Using Optimal Normal Bases
1 Subquadratic Computational Complexity Schemes for Extended Binary Field Multiplication Using Optimal Normal Bases H. Fan and M. A. Hasan March 31, 2007 Abstract Based on a recently proposed Toeplitz
More informationPARALLEL MULTIPLICATION IN F 2
PARALLEL MULTIPLICATION IN F 2 n USING CONDENSED MATRIX REPRESENTATION Christophe Negre Équipe DALI, LP2A, Université de Perpignan avenue P Alduy, 66 000 Perpignan, France christophenegre@univ-perpfr Keywords:
More informationA new class of irreducible pentanomials for polynomial based multipliers in binary fields
Noname manuscript No. (will be inserted by the editor) A new class of irreducible pentanomials for polynomial based multipliers in binary fields Gustavo Banegas Ricardo Custódio Daniel Panario the date
More informationSpectral Modular Arithmetic for Binary Extension Fields
2011 International Conference on Information an Computer Networks (ICICN 2011) Spectral Moular Arithmetic for Binary Extension Fiels Gokay Salamli MIS epartment, Bogazici University 34342 Bebek, Istanbul,
More informationSYNCHRONOUS SEQUENTIAL CIRCUITS
CHAPTER SYNCHRONOUS SEUENTIAL CIRCUITS Registers an counters, two very common synchronous sequential circuits, are introuce in this chapter. Register is a igital circuit for storing information. Contents
More informationA New Approach to Subquadratic Space Complexity Parallel Multipliers for Extended Binary Fields
1 A New Approach to Subquadratic Space Complexity Parallel Multipliers for Extended Binary Fields Haining Fan and M. Anwar Hasan Senior Member, IEEE July 19, 2006 Abstract Based on Toeplitz matrix-vector
More informationBINARY extension fields GF (2 m ) are heavily used
This article has been accepte for publication in a future issue of this journal, but has not been fully eite. Content ay change prior to final publication. Citation inforation: DOI 0.09/TC.205.248408,
More informationSubquadratic Space Complexity Multiplication over Binary Fields with Dickson Polynomial Representation
Subquadratic Space Complexity Multiplication over Binary Fields with Dickson Polynomial Representation M A Hasan and C Negre Abstract We study Dickson bases for binary field representation Such representation
More informationNew Bit-Level Serial GF (2 m ) Multiplication Using Polynomial Basis
2015 IEEE 22nd Symposium on Computer Arithmetic New Bit-Level Serial GF 2 m ) Multiplication Using Polynomial Basis Hayssam El-Razouk and Arash Reyhani-Masoleh Department of Electrical and Computer Engineering
More informationTIME-DELAY ESTIMATION USING FARROW-BASED FRACTIONAL-DELAY FIR FILTERS: FILTER APPROXIMATION VS. ESTIMATION ERRORS
TIME-DEAY ESTIMATION USING FARROW-BASED FRACTIONA-DEAY FIR FITERS: FITER APPROXIMATION VS. ESTIMATION ERRORS Mattias Olsson, Håkan Johansson, an Per öwenborg Div. of Electronic Systems, Dept. of Electrical
More informationA New Approach to Subquadratic Space Complexity Parallel Multipliers for Extended Binary Fields
1 A New Approach to Subquadratic Space Complexity Parallel Multipliers for Extended Binary Fields Haining Fan and M. Anwar Hasan Senior Member, IEEE January 5, 2006 Abstract Based on Toeplitz matrix-vector
More informationEfficient RNS bases for Cryptography
1 Efficient RNS bases for Cryptography Jean-Claue Bajar, Nicolas Meloni an Thomas Plantar LIRMM UMR 5506, University of Montpellier, France, {bajar,meloni,plantar}@lirmm.fr Abstract Resiue Number Systems
More informationBSIDES multiplication, squaring is also an important
1 Bit-Parallel GF ( n ) Squarer Using Shifted Polynomial Basis Xi Xiong and Haining Fan Abstract We present explicit formulae and complexities of bit-parallel shifted polynomial basis (SPB) squarers in
More informationMontgomery Multiplier and Squarer in GF(2 m )
Montgomery Multiplier and Squarer in GF( m ) Huapeng Wu The Centre for Applied Cryptographic Research Department of Combinatorics and Optimization University of Waterloo, Waterloo, Canada h3wu@cacrmathuwaterlooca
More informationarxiv: v1 [cs.ds] 31 May 2017
Succinct Partial Sums an Fenwick Trees Philip Bille, Aners Roy Christiansen, Nicola Prezza, an Freerik Rye Skjoljensen arxiv:1705.10987v1 [cs.ds] 31 May 2017 Technical University of Denmark, DTU Compute,
More informationReducing the Complexity of Normal Basis Multiplication
Reducing the Complexity of Normal Basis Multiplication Ömer Eǧecioǧlu and Çetin Kaya Koç Department of Computer Science University of California Santa Barbara {omer,koc}@cs.ucsb.edu Abstract In this paper
More informationRevisiting Finite Field Multiplication Using Dickson Bases
Revisiting Finite Field Multiplication Using Dickson Bases Bijan Ansari and M. Anwar Hasan Department of Electrical and Computer Engineering University of Waterloo, Waterloo, Ontario, Canada {bansari,
More informationOn one class of permutation polynomials over finite fields of characteristic two *
On one class of permutation polynomials over finite fields of characteristic two * Leonid Bassalygo, Victor A. Zinoviev To cite this version: Leonid Bassalygo, Victor A. Zinoviev. On one class of permutation
More informationAre standards compliant Elliptic Curve Cryptosystems feasible on RFID?
Are standards compliant Elliptic Curve Cryptosystems feasible on RFID? Sandeep S. Kumar and Christof Paar Horst Görtz Institute for IT Security, Ruhr-Universität Bochum, Germany Abstract. With elliptic
More informationHardware Operator for Simultaneous Sine and Cosine Evaluation
Hardware Operator for Simultaneous Sine and Cosine Evaluation Arnaud Tisserand To cite this version: Arnaud Tisserand. Hardware Operator for Simultaneous Sine and Cosine Evaluation. ICASSP 6: International
More informationThe Accelerated Euclidean Algorithm
The Accelerated Euclidean Algorithm Sidi Mohamed Sedjelmaci To cite this version: Sidi Mohamed Sedjelmaci The Accelerated Euclidean Algorithm Laureano Gonzales-Vega and Thomas Recio Eds 2004, University
More informationWe G Model Reduction Approaches for Solution of Wave Equations for Multiple Frequencies
We G15 5 Moel Reuction Approaches for Solution of Wave Equations for Multiple Frequencies M.Y. Zaslavsky (Schlumberger-Doll Research Center), R.F. Remis* (Delft University) & V.L. Druskin (Schlumberger-Doll
More informationCMSC 313 Preview Slides
CMSC 33 Preview Slies These are raft slies. The actual slies presente in lecture may be ifferent ue to last minute changes, scheule slippage,... UMBC, CMSC33, Richar Chang CMSC 33 Lecture
More informationIntroduction EE 224: INTRODUCTION TO DIGITAL CIRCUITS & COMPUTER DESIGN. Lecture 6: Sequential Logic 3 Registers & Counters 5/9/2010
EE 224: INTROUCTION TO IGITAL CIRCUITS & COMPUTER ESIGN Lecture 6: Sequential Logic 3 Registers & Counters 05/10/2010 Avinash Kodi, kodi@ohio.edu Introduction 2 A Flip-Flop stores one bit of information
More informationHigh Performance GHASH Function for Long Messages
High Performance GHASH Function for Long Messages Nicolas Méloni 1, Christophe Négre 2 and M. Anwar Hasan 1 1 Department of Electrical and Computer Engineering University of Waterloo, Canada 2 Team DALI/ELIAUS
More informationOn the Enumeration of Double-Base Chains with Applications to Elliptic Curve Cryptography
On the Enumeration of Double-Base Chains with Applications to Elliptic Curve Cryptography Christophe Doche Department of Computing Macquarie University, Australia christophe.oche@mq.eu.au. Abstract. The
More informationFactorisation of RSA-704 with CADO-NFS
Factorisation of RSA-704 with CADO-NFS Shi Bai, Emmanuel Thomé, Paul Zimmermann To cite this version: Shi Bai, Emmanuel Thomé, Paul Zimmermann. Factorisation of RSA-704 with CADO-NFS. 2012. HAL Id: hal-00760322
More informationLecture 2 Lagrangian formulation of classical mechanics Mechanics
Lecture Lagrangian formulation of classical mechanics 70.00 Mechanics Principle of stationary action MATH-GA To specify a motion uniquely in classical mechanics, it suffices to give, at some time t 0,
More informationA new simple recursive algorithm for finding prime numbers using Rosser s theorem
A new simple recursive algorithm for finding prime numbers using Rosser s theorem Rédoane Daoudi To cite this version: Rédoane Daoudi. A new simple recursive algorithm for finding prime numbers using Rosser
More informationA Simple Proof of P versus NP
A Simple Proof of P versus NP Frank Vega To cite this version: Frank Vega. A Simple Proof of P versus NP. 2016. HAL Id: hal-01281254 https://hal.archives-ouvertes.fr/hal-01281254 Submitted
More information. Using a multinomial model gives us the following equation for P d. , with respect to same length term sequences.
S 63 Lecture 8 2/2/26 Lecturer Lillian Lee Scribes Peter Babinski, Davi Lin Basic Language Moeling Approach I. Special ase of LM-base Approach a. Recap of Formulas an Terms b. Fixing θ? c. About that Multinomial
More informationReactive Power Compensation in Mechanical Systems
Reactive Power Compensation in Mechanical Systems Carlos Rengifo, Bassel Kaar, Yannick Aoustin, Christine Chevallereau To cite this version: Carlos Rengifo, Bassel Kaar, Yannick Aoustin, Christine Chevallereau.
More informationLinear First-Order Equations
5 Linear First-Orer Equations Linear first-orer ifferential equations make up another important class of ifferential equations that commonly arise in applications an are relatively easy to solve (in theory)
More informationAnalysis of Boyer and Moore s MJRTY algorithm
Analysis of Boyer and Moore s MJRTY algorithm Laurent Alonso, Edward M. Reingold To cite this version: Laurent Alonso, Edward M. Reingold. Analysis of Boyer and Moore s MJRTY algorithm. Information Processing
More informationLeast-Squares Regression on Sparse Spaces
Least-Squares Regression on Sparse Spaces Yuri Grinberg, Mahi Milani Far, Joelle Pineau School of Computer Science McGill University Montreal, Canaa {ygrinb,mmilan1,jpineau}@cs.mcgill.ca 1 Introuction
More informationClosed loop observer-based parameter estimation of quantum systems with a single population measurement
Close loop observer-base parameter estimation of quantum systems with a single population measurement Zaki Leghtas To cite this version: Zaki Leghtas. Close loop observer-base parameter estimation of quantum
More informationConsider for simplicity a 3rd-order IIR filter with a transfer function. where
Basic IIR Digital Filter The causal IIR igital filters we are concerne with in this course are characterie by a real rational transfer function of or, equivalently by a constant coefficient ifference equation
More informationMastrovito Form of Non-recursive Karatsuba Multiplier for All Trinomials
1 Mastrovito Form of Non-recursive Karatsuba Multiplier for All Trinomials Yin Li, Xingpo Ma, Yu Zhang and Chuanda Qi Abstract We present a new type of bit-parallel non-recursive Karatsuba multiplier over
More informationBasic IIR Digital Filter Structures
Basic IIR Digital Filter Structures The causal IIR igital filters we are concerne with in this course are characterie by a real rational transfer function of or, equivalently by a constant coefficient
More informationImplicit Differentiation
Implicit Differentiation Thus far, the functions we have been concerne with have been efine explicitly. A function is efine explicitly if the output is given irectly in terms of the input. For instance,
More informationOn Newton-Raphson iteration for multiplicative inverses modulo prime powers
On Newton-Raphson iteration for multiplicative inverses modulo prime powers Jean-Guillaume Dumas To cite this version: Jean-Guillaume Dumas. On Newton-Raphson iteration for multiplicative inverses modulo
More informationGCD of Random Linear Combinations
JOACHIM VON ZUR GATHEN & IGOR E. SHPARLINSKI (2006). GCD of Ranom Linear Combinations. Algorithmica 46(1), 137 148. ISSN 0178-4617 (Print), 1432-0541 (Online). URL https://x.oi.org/10.1007/s00453-006-0072-1.
More informationEfficient Digit-Serial Normal Basis Multipliers over Binary Extension Fields
Efficient Digit-Serial Normal Basis Multipliers over Binary Extension Fields ARASH REYHANI-MASOLEH and M. ANWAR HASAN University of Waterloo In this article, two digit-serial architectures for normal basis
More informationAN IMPROVED LOW LATENCY SYSTOLIC STRUCTURED GALOIS FIELD MULTIPLIER
Indian Journal of Electronics and Electrical Engineering (IJEEE) Vol.2.No.1 2014pp1-6 available at: www.goniv.com Paper Received :05-03-2014 Paper Published:28-03-2014 Paper Reviewed by: 1. John Arhter
More informationExact Comparison of Quadratic Irrationals
Exact Comparison of Quadratic Irrationals Phuc Ngo To cite this version: Phuc Ngo. Exact Comparison of Quadratic Irrationals. [Research Report] LIGM. 20. HAL Id: hal-0069762 https://hal.archives-ouvertes.fr/hal-0069762
More information'HVLJQ &RQVLGHUDWLRQ LQ 0DWHULDO 6HOHFWLRQ 'HVLJQ 6HQVLWLYLW\,1752'8&7,21
Large amping in a structural material may be either esirable or unesirable, epening on the engineering application at han. For example, amping is a esirable property to the esigner concerne with limiting
More informationSection 7.1: Integration by Parts
Section 7.1: Integration by Parts 1. Introuction to Integration Techniques Unlike ifferentiation where there are a large number of rules which allow you (in principle) to ifferentiate any function, the
More informationTwo Dimensional Linear Phase Multiband Chebyshev FIR Filter
Two Dimensional Linear Phase Multiband Chebyshev FIR Filter Vinay Kumar, Bhooshan Sunil To cite this version: Vinay Kumar, Bhooshan Sunil. Two Dimensional Linear Phase Multiband Chebyshev FIR Filter. Acta
More informationA New Vulnerable Class of Exponents in RSA
A ew Vulnerable Class of Exponents in RSA Aberrahmane itaj Laboratoire e Mathématiues icolas Oresme Campus II, Boulevar u Maréchal Juin BP 586, 4032 Caen Ceex, France. nitaj@math.unicaen.fr http://www.math.unicaen.fr/~nitaj
More informationd dx But have you ever seen a derivation of these results? We ll prove the first result below. cos h 1
Lecture 5 Some ifferentiation rules Trigonometric functions (Relevant section from Stewart, Seventh Eition: Section 3.3) You all know that sin = cos cos = sin. () But have you ever seen a erivation of
More informationCOUNTING VALUE SETS: ALGORITHM AND COMPLEXITY
COUNTING VALUE SETS: ALGORITHM AND COMPLEXITY QI CHENG, JOSHUA E. HILL, AND DAQING WAN Abstract. Let p be a prime. Given a polynomial in F p m[x] of egree over the finite fiel F p m, one can view it as
More informationOn size, radius and minimum degree
On size, radius and minimum degree Simon Mukwembi To cite this version: Simon Mukwembi. On size, radius and minimum degree. Discrete Mathematics and Theoretical Computer Science, DMTCS, 2014, Vol. 16 no.
More informationSparse multivariate factorization by mean of a few bivariate factorizations
Sparse multivariate factorization by mean of a few bivariate factorizations Bernard Parisse To cite this version: Bernard Parisse. Sparse multivariate factorization by mean of a few bivariate factorizations.
More informationEaster bracelets for years
Easter bracelets for 5700000 years Denis Roegel To cite this version: Denis Roegel. Easter bracelets for 5700000 years. [Research Report] 2014. HAL Id: hal-01009457 https://hal.inria.fr/hal-01009457
More informationSensitivity of hybrid filter banks A/D converters to analog realization errors and finite word length
Sensitivity of hybrid filter banks A/D converters to analog realization errors and finite word length Tudor Petrescu, Jacques Oksman To cite this version: Tudor Petrescu, Jacques Oksman. Sensitivity of
More informationIterative Karatsuba For Multivariate Polynomial Multiplication
Iterative Karatsuba For Multivariate Polynomial Multiplication Alberto Zanoni Centro Vito Volterra Università i Roma Tor Vergata Via Columbia 2 033 Roma, Italy zanoni@volterra.uniroma2.it Abstract. This
More informationA check digit system over a group of arbitrary order
2013 8th International Conference on Communications an Networking in China (CHINACOM) A check igit system over a group of arbitrary orer Yanling Chen Chair of Communication Systems Ruhr University Bochum
More informationImplementation Options for Finite Field Arithmetic for Elliptic Curve Cryptosystems Christof Paar Electrical & Computer Engineering Dept. and Computer Science Dept. Worcester Polytechnic Institute Worcester,
More informationEfficient Hardware Implementation of Finite Fields with Applications to Cryptography
Acta Appl Math (2006) 93: 75 118 DOI 10.1007/s10440-006-9072-z Efficient Hardware Implementation of Finite Fields with Applications to Cryptography Jorge Guajardo Tim Güneysu Sandeep S. Kumar Christof
More informationEfficient FPGA Implementation of Gaussian Noise Generator for Communication Channel Emulation
Efficient FPGA Implementation of Gaussian Noise Generator for Communication Channel Emulation Jean-Luc anger, Adel Ghazel, Emmanuel Boutillon, H. Laamari To cite this version: Jean-Luc anger, Adel Ghazel,
More informationSurvey Sampling. 1 Design-based Inference. Kosuke Imai Department of Politics, Princeton University. February 19, 2013
Survey Sampling Kosuke Imai Department of Politics, Princeton University February 19, 2013 Survey sampling is one of the most commonly use ata collection methos for social scientists. We begin by escribing
More informationLATTICE-BASED D-OPTIMUM DESIGN FOR FOURIER REGRESSION
The Annals of Statistics 1997, Vol. 25, No. 6, 2313 2327 LATTICE-BASED D-OPTIMUM DESIGN FOR FOURIER REGRESSION By Eva Riccomagno, 1 Rainer Schwabe 2 an Henry P. Wynn 1 University of Warwick, Technische
More informationSUBQUADRATIC BINARY FIELD MULTIPLIER IN DOUBLE POLYNOMIAL SYSTEM
SUBQUADRATIC BINARY FIELD MULTIPLIER IN DOUBLE POLYNOMIAL SYSTEM Pascal Giorgi, Christophe Nègre 2 Équipe DALI, LP2A, Unversité de Perpignan avenue P. Alduy, F66860 Perpignan, France () pascal.giorgi@univ-perp.fr,
More informationLEGENDRE TYPE FORMULA FOR PRIMES GENERATED BY QUADRATIC POLYNOMIALS
Ann. Sci. Math. Québec 33 (2009), no 2, 115 123 LEGENDRE TYPE FORMULA FOR PRIMES GENERATED BY QUADRATIC POLYNOMIALS TAKASHI AGOH Deicate to Paulo Ribenboim on the occasion of his 80th birthay. RÉSUMÉ.
More informationModular composition modulo triangular sets and applications
Moular composition moulo triangular sets an applications Arien Poteaux Éric Schost arien.poteaux@lip6.fr eschost@uwo.ca : Computer Science Department, The University of Western Ontario, Lonon, ON, Canaa
More informationMulti-edge Optimization of Low-Density Parity-Check Codes for Joint Source-Channel Coding
Multi-ege Optimization of Low-Density Parity-Check Coes for Joint Source-Channel Coing H. V. Beltrão Neto an W. Henkel Jacobs University Bremen Campus Ring 1 D-28759 Bremen, Germany Email: {h.beltrao,
More informationUnit #6 - Families of Functions, Taylor Polynomials, l Hopital s Rule
Unit # - Families of Functions, Taylor Polynomials, l Hopital s Rule Some problems an solutions selecte or aapte from Hughes-Hallett Calculus. Critical Points. Consier the function f) = 54 +. b) a) Fin
More informationLearning an Adaptive Dictionary Structure for Efficient Image Sparse Coding
Learning an Adaptive Dictionary Structure for Efficient Image Sparse Coding Jérémy Aghaei Mazaheri, Christine Guillemot, Claude Labit To cite this version: Jérémy Aghaei Mazaheri, Christine Guillemot,
More informationOutcomes. Unit 14. Review of State Machines STATE MACHINES OVERVIEW. State Machine Design
4. Outcomes 4.2 Unit 4 tate Machine Design I can create a state iagram to solve a sequential problem I can implement a working state machine given a state iagram 4.3 Review of tate Machines 4.4 TATE MACHINE
More informationWhy Bernstein Polynomials Are Better: Fuzzy-Inspired Justification
Why Bernstein Polynomials Are Better: Fuzzy-Inspire Justification Jaime Nava 1, Olga Kosheleva 2, an Vlaik Kreinovich 3 1,3 Department of Computer Science 2 Department of Teacher Eucation University of
More informationA Digit-Serial Systolic Multiplier for Finite Fields GF(2 m )
A Digit-Serial Systolic Multiplier for Finite Fields GF( m ) Chang Hoon Kim, Sang Duk Han, and Chun Pyo Hong Department of Computer and Information Engineering Taegu University 5 Naeri, Jinryang, Kyungsan,
More information2Algebraic ONLINE PAGE PROOFS. foundations
Algebraic founations. Kick off with CAS. Algebraic skills.3 Pascal s triangle an binomial expansions.4 The binomial theorem.5 Sets of real numbers.6 Surs.7 Review . Kick off with CAS Playing lotto Using
More informationEfficient multiplication using type 2 optimal normal bases
Efficient multiplication using type 2 optimal normal bases Joachim von zur Gathen 1, Amin Shokrollahi 2, and Jamshid Shokrollahi 3 1 B-IT, Dahlmannstr. 2, Universität Bonn, 53113 Bonn, Germany gathen@bit.uni-bonn.de
More informationDiagonalization of Matrices Dr. E. Jacobs
Diagonalization of Matrices Dr. E. Jacobs One of the very interesting lessons in this course is how certain algebraic techniques can be use to solve ifferential equations. The purpose of these notes is
More informationDecoding A Counter. svbitec.wordpress.com 1
ecoding A ounter ecoding a counter involves determining which state in the sequence the counter is in. ifferentiate between active-high and active-low decoding. Active-HIGH decoding: output HIGH if the
More informationComputing the Longest Common Subsequence of Multiple RLE Strings
The 29th Workshop on Combinatorial Mathematics an Computation Theory Computing the Longest Common Subsequence of Multiple RLE Strings Ling-Chih Yao an Kuan-Yu Chen Grauate Institute of Networking an Multimeia
More informationTable of Common Derivatives By David Abraham
Prouct an Quotient Rules: Table of Common Derivatives By Davi Abraham [ f ( g( ] = [ f ( ] g( + f ( [ g( ] f ( = g( [ f ( ] g( g( f ( [ g( ] Trigonometric Functions: sin( = cos( cos( = sin( tan( = sec
More informationx f(x) x f(x) approaching 1 approaching 0.5 approaching 1 approaching 0.
Engineering Mathematics 2 26 February 2014 Limits of functions Consier the function 1 f() = 1. The omain of this function is R + \ {1}. The function is not efine at 1. What happens when is close to 1?
More informationDesign at the Register Transfer Level
Week-7 Design at the Register Transfer Level Algorithmic State Machines Algorithmic State Machine (ASM) q Our design methodologies do not scale well to real-world problems. q 232 - Logic Design / Algorithmic
More informationDigital Logic Design. Midterm #2
EECS: igital Logic esign r. nthony. Johnson f5m2s_il7.fm - igital Logic esign Miterm #2 Problems Points. 5 2. 4 3. 6 Total 5 Was the exam fair? yes no EECS: igital Logic esign r. nthony. Johnson f5m2s_il7.fm
More informationFull-order observers for linear systems with unknown inputs
Full-order observers for linear systems with unknown inputs Mohamed Darouach, Michel Zasadzinski, Shi Jie Xu To cite this version: Mohamed Darouach, Michel Zasadzinski, Shi Jie Xu. Full-order observers
More informationOn infinite permutations
On infinite permutations Dmitri G. Fon-Der-Flaass, Anna E. Frid To cite this version: Dmitri G. Fon-Der-Flaass, Anna E. Frid. On infinite permutations. Stefan Felsner. 2005 European Conference on Combinatorics,
More informationHook lengths and shifted parts of partitions
Hook lengths and shifted parts of partitions Guo-Niu Han To cite this version: Guo-Niu Han Hook lengths and shifted parts of partitions The Ramanujan Journal, 009, 9 p HAL Id: hal-00395690
More informationLinear and quadratic approximation
Linear an quaratic approximation November 11, 2013 Definition: Suppose f is a function that is ifferentiable on an interval I containing the point a. The linear approximation to f at a is the linear function
More informationFundamentals of Digital Design
Fundamentals of Digital Design Digital Radiation Measurement and Spectroscopy NE/RHP 537 1 Binary Number System The binary numeral system, or base-2 number system, is a numeral system that represents numeric
More informationHigh rate soft output Viterbi decoder
High rate soft output Viterbi decoder Eric Lüthi, Emmanuel Casseau Integrated Circuits for Telecommunications Laboratory Ecole Nationale Supérieure des Télécomunications de Bretagne BP 83-985 Brest Cedex
More informationTwo formulas for the Euler ϕ-function
Two formulas for the Euler ϕ-function Robert Frieman A multiplication formula for ϕ(n) The first formula we want to prove is the following: Theorem 1. If n 1 an n 2 are relatively prime positive integers,
More informationKaratsuba with Rectangular Multipliers for FPGAs
Karatsuba with Rectangular Multipliers for FPGAs Martin Kumm, Oscar Gustafsson, Florent De Dinechin, Johannes Kappauf, Peter Zipf To cite this version: Martin Kumm, Oscar Gustafsson, Florent De Dinechin,
More informationA proximal approach to the inversion of ill-conditioned matrices
A proximal approach to the inversion of ill-conditioned matrices Pierre Maréchal, Aude Rondepierre To cite this version: Pierre Maréchal, Aude Rondepierre. A proximal approach to the inversion of ill-conditioned
More informationNILPOTENCE ORDER GROWTH OF RECURSION OPERATORS IN CHARACTERISTIC p. Contents. 1. Introduction Preliminaries 3. References
NILPOTENCE ORDER GROWTH OF RECURSION OPERATORS IN CHARACTERISTIC p ANNA MEDVEDOVSKY Abstract. We prove that the killing rate of certain egree-lowering recursion operators on a polynomial algebra over a
More informationMethylation-associated PHOX2B gene silencing is a rare event in human neuroblastoma.
Methylation-associated PHOX2B gene silencing is a rare event in human neuroblastoma. Loïc De Pontual, Delphine Trochet, Franck Bourdeaut, Sophie Thomas, Heather Etchevers, Agnes Chompret, Véronique Minard,
More informationTime Allowed 3:00 hrs. April, pages
IGITAL ESIGN COEN 32 Prof. r. A. J. Al-Khalili Time Allowed 3: hrs. April, 998 2 pages Answer All uestions No materials are allowed uestion a) esign a half subtractor b) esign a full subtractor c) Using
More information