Sequential Multiplier with Sub-linear Gate Complexity

Size: px
Start display at page:

Download "Sequential Multiplier with Sub-linear Gate Complexity"

Transcription

1 Sequential Multiplier with Sub-linear Gate Complexity Anwar Hasan, Christophe Negre To cite this version: Anwar Hasan, Christophe Negre. Sequential Multiplier with Sub-linear Gate Complexity. [Research Report] 212, pp.12. <hal-71285> HAL I: hal Submitte on 26 Jun 212 HAL is a multi-isciplinary open access archive for the eposit an issemination of scientific research ocuments, whether they are publishe or not. The ocuments may come from teaching an research institutions in France or abroa, or from public or private research centers. L archive ouverte pluriisciplinaire HAL, est estinée au épôt et à la iffusion e ocuments scientifiques e niveau recherche, publiés ou non, émanant es établissements enseignement et e recherche français ou étrangers, es laboratoires publics ou privés.

2 Sequential Multiplier with Sub-linear Gate 1 Complexity M. Anwar Hasan an Christophe Negre Abstract In this article, we present a new sequential multiplier for extene binary finite fiels. Like its existing counterparts, the propose multiplier has a linear complexity in flip-flop or temporary storage requirements, but a sub-linear complexity in gate counts. For the unerlying polynomial multiplication, the propose fiel multiplier relies on the Horner scheme. Inex Terms Binary polynomial multiplication, sequential multiplier, Horner scheme, sub-linear gate complexity. 1 INTRODUCTION Multiplication over finite fiels is use in both symmetric an asymmetric key cryptosystems, an has been a subject of stuy, especially for its improve implementation, among many researchers as evience in their publications, see for example [8], [13], [5], [1], [14], [11], [4]. In this article, we consier a class of harware architectures for multiplication over extene binary finite fiel F 2 n. For a small size fiel like the one use in the well known symmetric key system Avance Encryption Stanar (AES) [1], multiplication can be easily realize with a simple look-up-table (LUT), where the prouct of each combination of input is pre-store, preferably in a rea-only-memory (ROM). This table base metho is however impractical for large size fiels use in moern asymmetric key cryptosystems like Elliptic Curve Cryptography (ECC) [9], [6]. Asymptotically, a look-up table for multiplication can take as much as O(n2 2n ) bits of ROM an the time elay woul be essentially equal to the table access time, which is normally a function of the table size. Techniques exist to reuce the table size at the expense of an increase number of table accesses along with logic circuits. For high spee multiplication over a large fiel, an alternative approach is to use only logic circuits or gates in some parallel way an to perform a multiplication on-the-fly, e.g., a fully bit parallel multiplier. June 26, 212 DRAFT

3 For ECC, where the value of n is only a few hunres, a practical bit-parallel multiplier woul take O(n 1+ǫ ) logic gates, where < ǫ 1, an have a time elay of O(logn) layers of gates. In constraine environments, where silicon space is of prime concern, a fully bit parallel multiplier for a large fiel is generally too big to fit the esign. On the other en of the spectrum of choices, it is possible, at least in theory, to realize a multiplier with as few as only two gates one XOR an one AND where the gates will be use repeately an many intermeiate bit-level results will nee to be store. We will refer to this type of multipliers as super-sequential, since they woul take O(n 1+ǫ ) iterations or clock cycles.the storage requirement for a super-sequential multiplier woul be at least O(n 1+ǫ ). Because of large timing an memory requirements, super-sequential multipliers are likely to be least attractive for both constraine an high spee applications an this is perhaps why no practical esign of the super-sequential multiplier has been reporte in the literature. Between the above two extremes, namely fully parallel an super-sequential multipliers, one can fin various sequential multipliers, either at bit or igit-level. A sequential multiplier operates in an iterative way over a number of clock cycles, typically O(n) cycles for bit sequential or O(n/) cycles for igit sequential architecture, where is the igit size. A bit sequential multiplier has a shorter critical path than its igit sequential counterpart. For a bit or igit sequential multiplier, since intermeiate results are store in registers or rea-write memories, the storage requirement is at least O(n) bits. Besies registers, a sequential multiplier also requires logic gates, generally in the amount of O(n), i.e., linear to n. In our work, we ifferentiate ROM from registers in the usual way. In other wors, while the content of a ROM is fixe an specific to a certain arithmetic operation, the content of a register can change. More importantly, registers are time-share, i.e., a set of registers can be use by multiple operations, for example, aitions, multiplication an inversion, provie that these operations are not execute simultaneously. On the other han, like ROM but unlike registers, most of the logic gates are assume to be specific to a certain operation an not share. As a result, even if an arithmetic unit, such as a multiplier, can be esigne to take avantage of time share registers, there is still a nee to reuce the amount of logic gates, especially for area constraine applications. In this article, we propose a new sequential multiplier. Like its existing counterparts the propose one requires O(n) bits of registers, but only O(n 1 ǫ ), < ǫ 1, logic gates. To the best of our knowlege, no sequential multiplier has been reporte earlier that has a gate count sub-linear to n. To give an iea about where the propose multiplier fits with respect to various others, in Table 1 we list their space an time complexities in an asymptotic or general way. The remainer of this article is organize as follows. In Section 2, we briefly review schemes for a fully bit parallel an a igit-sequential multiplier. In Section 3, we present our sequential multiplier which is base on the Horner metho an has a sub-linear gate complexity. Finally, a complexity comparison an 2

4 concluing remarks are given Section 4. TABLE 1 List of ifferent types of multipliers an their complexities Architecture # Logic gates or ROM cells # Flip-flops in registers Critical Path Delay # Clock Cycles Full LUT n2 2n O(n) 1 Fully parallel circuit O(n 1+ε ) O(log(n)) 1 Digit-sequential circuit O(n) O(n) O(log()) n/ Bit-sequential circuit O(n) O(n) O(1) n Propose O(n 1 ǫ ) O(n) O(log(n)) O(n) 2 REVIEW OF EXTENDED BINARY FIELD MULTIPLIERS Fiel F 2 n can be viewe as the set of binary polynomials in t moulo an irreucible polynomial P(t) of egree n. Let A(t) an B(t) be two elements of F 2 n. The multiplication of these two elements is C(t) = A(t) B(t) mo P(t), for which we can use the following two steps: C (t) = A(t) B(t), (1) an then reuce C (t) moulo P(t) to get C(t) = C (t) mo P(t). (2) 2.1 Bit parallel architectures In this type of architectures, all the bits of the prouct C = AB mo P are generate in parallel. The esign of the circuit is base on pure combinatorial logic an oes not make any use of storage or flip-flops. Computations are one with no reuse of circuits. The approach we recall here performs the polynomial multiplication (1) an the reuction (2) separately. The reuction moulo P is generally quite simple when P is sparse (i.e., P is a pentanomial or a trinomial) an in this situation the reuction operation can be implemente with O(n) XOR gates an a elay of O(1). Consequently, we will focus here to the polynomial multiplication which is the most costly an the most complicate part of a finite fiel multiplier. Quaratic multiplier. Let C = 2n 2 i= c i ti be the prouct C = A B where A an B are egree n 1 3

5 polynomials in t. The coefficients c i are given in terms of a i an b i as follows c = a b, c 1 = a b 1 +a 1 b,.. c n = a b n +a 1 b n 1 + +a n b, c n+1 = a 1 b n +a 2 b n 1 + +a n b 1,.. c 2n 3 = a n 2 b n 1 +a n 1 b n 2, c 2n 2 = a n 1 b n 1. The computation of each c i is performe in parallel with AND gates (for the proucts a l b j ) an a binary tree of XOR gates. The resulting gate complexity of this polynomial multiplier is equal to n 2 AND gates an n(n 1) XOR gates. The critical path of the multiplier is log 2 (n) D X +D A where D X an D A are elays for a two input XOR an AND gates respectively. Subquaratic multiplier [2]. A secon strategy, which was first propose in [4], is base on the metho of Karatsuba. Specifically, the multiplication is performe by applying the following formula recursively Splitting: A = A +A 1 t n/2 an B = B +B 1 t n/2, Recursive proucts: M = A B,M 1 = (A +A 1 ) (B +B ) an M 2 = A 1 B 1, Reconstruction: C = M +t n/2 (M 1 +M +M 2 )+t n M 2, As state in [4], this approach requires 6n log 2 (3) + 8n 2 XOR gates, n log 2 (3) AND gates an has a elay of 3log 2 (n)d X + D A. Recently, some optimizations have been propose: Leone in [7] has notice that it is possible to slightly reuce the space complexity of the Karatsuba multiplier if we stop the recursion when we reach polynomials of egree 4 or 8 an then apply quaratic metho. More recently, Fan et al. in [3] have propose to use an o/even splitting which reuces the elay to 2log 2 (n)d X +D A. In Table 2, we recall the complexity of the schoolbook metho an then give the complexity of multipliers base on the Karatsuba combine with the optimization approaches of Leone [7] an Fan et al. [3]. 2.2 Digit Sequential Multiplier In sequential multipliers, computations are one with reuse of circuits an the final result is obtaine over several clock cycles. Here, we review the igit sequential version of the multiplier of Song an Parhi [12]. Song an Parhi fix a igit size an efine m = n an then they rewrite the two polynomials A an 4

6 TABLE 2 Complexity of bit parallel binary polynomial multiplier architectures Metho Space Complexity Delay # XOR # AND Quaratic n 2 1 n 2 D A + log 2 (n) D X Subquaratic [3] 6n log 2 (3) 8n+2 n log 2 (3) D A +(2log 2 (n))d X Subquaratic [3] an [7] combine 13 3 nlog 2 (3) 8n nlog 2 (3) D A +(2log 2 (n) 2)D X B as follows A(t) = m 1 i= A i(t)t i with eg t A i (t) <, B(t) = m 1 i= B i(t)t i with eg t B i (t) <. The left-to-right (L-to-R) metho for igit-serial multiplication is base on the following expansion of the prouct A B mo P C = A B mo P = ((...((AB m 1 mo P)t +AB m 2 mo P)t + )t +AB 1 mo P)t +AB mo P. The previous expression results in the following L-to-R multiplication algorithm. It consists of a sequence of multiplications by t followe by the accumulation of AB i in C moulo P. Algorithm 1 Left-to-right igit sequential multiplication [12] Require: A(t) = m 1 i= A i(t)t i an B(t) = m 1 i= B i(t)t i. Ensure: C = A B C for i = m 1 to o C (t C +B i A) mo P en for Return(C) In Algorithm 1, the multiplication byt is performe by shifting the coefficients ofc. The multiplication B i A is one using m parallel quaratic space complexity polynomial multipliers of size. These igit multipliers compute the prouct B i A j for j =,...,m 1. Each prouct B i A j has egree 2 2: thus the upper part of this prouct is ae to C j+1 an the lower part to C j. Then the upate value of C has m + 1 igits, since in C m we store the upper part of the prouct B i A m 1. If we assume that 5

7 P = t m + m 1 i= P i(t)t i, then we reuce C m moulo P using the following expression C m t m = m 1 i= P i C m t i. In practical applications, P can be taken as a pentanomial or a trinomial, so the P i s are in general either equal to zero or sparse. Here, for the sake of simplicity, we will further assume that the only non-zero P i is P. This means that the reuction step consists of C m t m = P C m an can be performe with at most 3( 1) XOR gates (inee, if P is a pentanomial, then P has 4 non-zero coefficients). The resulting igit sequential multiplier is epicte in Fig. 1. The Digit Mult. boxes represent the quaratic parallel polynomial multipliers for egree polynomials. Fig. 1. Left-to-right igit sequential multiplier of [12] B,...,B m 2,B m 1 A m 1 A m 2 A 1 A Digit Mult. Digit Mult. Digit Mult. Digit Mult C m 1 C m 2 C 1 C 1 Mult. by P The complexity of this igit sequential multiplier is given below. Note that S represents the number of XOR gates, S represents the number of AND gates an D represents the elay of the critical path of the architecture. We remark that the total computational elay is the number of clock cycles times the clock perio, whose uration is at least the critical path elay. S = m( 2 + 1)+5 4, S = m 2, D = log 2 ()+5 D X +D A, #Flip-flops = 3m, # Clock cycles = m. Remark 1: We have restricte our stuy to a quite specific P but in general when P has egree n an is a pentanomial, a similar approach can be applie with no aitional significant complexity. Our choice was motivate only by the simplicity of this special case in the igit sequential esign. 6

8 3 SUB-LINEAR GATE COMPLEXITY USING HORNER S METHOD In this section, we present a multiplier with sub-linear gate complexity base on the Horner metho. Our approach takes avantage of a subquaratic multiplier as well as a igit sequential multiplier. As before, let A(t) an B(t) be two polynomials of egree < n. Let m an be two integers such that m = n. We rewrite A an B in a igit form as follows: A(t) = m 1 i= A i(t)t i with eg t A i (t) < B(t) = m 1 i= B i(t)t i with eg t B i (t) < We multiply A an B using Horner s metho. Here we assume that the irreucible polynomial P has the form P = X m +P where P has a egree less than an has at most four non-zero coefficients. This assumption is not restrictive, a similar multiplier with the same orer of area an elay complexity can be esigne with a more general pentanomial P. The resulting metho is escribe in Algorithm 2 an uses the Left-to-Right approach. We have exhibite all the m 2 igit multiplications an we have separate the operations C +A j B i t j, j < m 1 an i < m, from the operations t (C +A m 1 B i t (m 1) ) mo P an (C +A m 1 B i t (m 1) ) mo P which involve reuction moulo P. The architecture base on Algorithm 2 is shown in Fig. 2. In this architecture, elements A an B are each store in a register of m cells, each cell containing bits. The prouct C is also store in a register of m cells an is initialize with m zeros. Registers containing A an C are shifte cyclically once in every clock cycle. On the other han, B is shifte once after every m clock cycles. At each clock cycle one of the following cases is performe an in Fig. 2 these three cases are inicate in re, blue an green.: Case 1 (Re). A igit A j for j < m 1 is output from the A register an the igit B i is output from B. The A an C registers are left shifte but no shift is operate in the B register. The two igits A j an B i are multiplie in the igit multiplier. Then the ata follows the blue lines. This correspons to the aition of A j B i to C j an the result moves in the right most cell of the C register. The carry of A j B i is ae to C j+1 an the result is store in the left most cell of C. Case 2 (Blue). The igit A m 1 an B i are output from A an B respectively. The A register is left shifte an theb register is right shifte, but no left shifts are applie to thec register. The two igits A m 1 an B i are multiplie an then, the ata follows the re paths. The operation correspons to the multiplication by t an the computation of ((C m 1 +A m 1 B i )t m mo P). Case 3 (Green). This is the last step before the output of the prouct C. At this step, the C register is left shifte. The igits A m 1 an B are output from the A an B registers an then multiplie through the igit multiplier. Then the lower part of the prouct is ae to C m 1 an the upper part is reuce moulo P, i.e., is multiplie by P an ae to C an C 1. 7

9 Algorithm 2 Horner s metho with reuction moulo P Require: A = m 1 j= Ajtj,B(t) = m 1 i= Biti in F 2[t] with ega(t),egb(t) < n an ega j,egb i < Ensure: C = A B C for i = m 1 to 1 for j = to m 2 en for U L +t U H A jb i, C j C j +U L,C j+1 C j+1 +U H temp C m 1 for j = m 1 to 3 Case 1: Comp. of C +( m 2 j= Ajtj )B i C j C j 1 en for U L +t U M +t 2 U H (temp+a mb i) P C 2 C 1 +U H, C 1 C +U M, C U L en for for j = to m 2 U L +t U H A jb C j C j +U L, C j+1 C j+1 +U H en for U L +t U H B m 1A C m 1 C m 1 +U L V L +t V H U H P C = C +V L,C 1 = C 1 +V H return(c) Case 2: Comp. of (C +A m 1t (m 1) B i) t mo P Case 1: Comp. of C +( m 2 j= Ajtj )B Case 3: Comp. of (C +A m 1t (m 1) B ) mo P To avoi any confusion between Case 2 an Case 3, in Fig. 2 we have use two Mult. by P boxes which perform a multiplication by P in the two istinct paths. The main ifferences between Algorithm 1 an Algorithm 2 an their respective architectures are the following: 1) in Algorithm 2 an in the corresponing architecture in Fig. 2, the igit multiplications are one in sequence an not through m parallel igit multipliers. 2) In the propose multiplier, the igit multiplication uses a subquaratic multiplier, an the igit size in Fig. 2 is generally larger than the one in Fig. 1. In Fig. 3, we illustrate the functioning of the propose multiplier by presenting the first four cycles of the sequential multiplier for n = 32. Complexity evaluation. Below we list, along with a brief explanation, the number of flip-flops, AND gates 8

10 Fig. 2. Sub-linear sequential multiplier base on the Horner metho B B m 2 B m 1 Digit Multiplier A m 1 A 1 A H L re re re L M H Mult. byp re re re re blue green C C 1 blue C 2 C 3 C 4 C m 2 C m 1 green green H green green Mult. byp L blue blue green an XOR gates an the critical path of the architecture in terms of m an. For the sake of simplicity, we assume that each path in Fig. 2 is of with. 3m cells of bits each for A, B an C. Thus, the architecture in Fig. 2 requires 3m flip flops in total. The number of AND gates is equal to S () which is the number of AND gates of the igit multiplier. The number of XOR gates is equal to S ()+5, where we have counte the following: the XOR gates of one multiplier of size, five aers of size, an XORs for the two multiplications by P. The architecture in Fig. 2 also requires one 1:2 an three 1:3 emultiplexers, an one 2:1 multiplexer where each input/output is bits wie. The critical path elay is equal to D()+4D X +D A where D() is the elay of the igit multiplier. The number of clock cycles is equal to m 2. Using the subquaratic complexity results base on [3] an [7] as given in Table 2, we obtain the 9

11 Fig. 3. First four steps of the multiplication of A = (t + 1) + (t + 1) t 24 an B = t + t 7 t 24 moulo P = t 4 8 +t 7 +t 6 +t+1 with m = 4 an = 32 (note that after the emultiplexer, the followe paths are inicate with bol lines) A = t+1 B = t 7 A1 = B = t 7 Digit Mult. 1 t 7 Digit Mult. Mult. by P Mult. by P C1 C2 C3 C C2 C3 C C1 1 t 7 t 7 1 Mult. by P Mult. by P (a) Step 1. Case 1 applies an the ata follows the re paths. A2 = B = t 7 (b) Step 2. Case 1 applies an the ata follows the re paths. A1 = t+1 B = t 7 Digit Mult. Digit Mult. Mult. by P t 7 t 7 +t 6 +t 2 +t+1 Mult. by P 1 t 7 1 t 7 C3 C C1 t 7 1 C2 C C1 C2 C3 t 7 t 6 +t 2 +t+1 1 Mult. by P Mult. by P (c) Step 3. Case 1 applies an the ata follows the re paths. () Step 4. Case 2 applies (blue paths). In this step, the prouct A 3 B = (t 8 + t 7 ) is multiplie by P. The result is t 15 + t 13 + t 1 + t 9 + t 8 + t 7 = t 7 + (t 7 + t 6 + t 2 +t+1)t 8 + t 16. following complexity for the multiplier in Fig. 2 #XOR = 13 3 log 2 (3) +3+2, #AND = 16 9 log 2 (3), #Flip-flops = 3m, Delay = (2log 2 ()+2)D X +D A, #Clock cycles = m 2. (3) 1

12 4 COMPLEXITY COMPARISON AND CONCLUSION We finally obtain a sub-linear gate complexity by fixing the value of an m as = n an m = n. The resulting complexity is given in Table 3. In the same table, we recall the complexity of the igit sequential multiplier of Song an Parhi [12] reviewe earlier in Section 2 (for which we assume that m = n/). TABLE 3 Comparison with the propose sequential multiplier Architecture # AND # XOR #FFs Critical # Clock Overall elay Path Delay Propose 1.77n n n+2 3n (log 2 (n)+4)d X +D A n n((log 2 (n)+2)d X +D A ) Song an Parhi [12] n n(+1 1 )+5 4 3n log 2 ()+5 D X +D A n cycles n( log 2 ()+5 D X +D A ) The results in Table 3 suggest that the propose sequential multiplier has a gate count which is much smaller than that of the multiplier of [12]. On the other han, the propose multiplier has a longer critical path resulting in a much larger overall elay. Thus the propose sub-linear gate complexity multiplier offers a new area-time trae-off. For example, if we consier n = 256 (i.e, = m = 16), the multiplier of [12] woul require 8596 XORs, 8192 ANDs, 16 clock cycles with 9 levels of gates on the critical path, whereas the corresponing values of the propose multiplier are 397 XORs, 143 ANDs, 256 clock cycles an 11 levels of gates. REFERENCES [1] J. Daemen an V. Rijmen. The Design of Rijnael: AES - The Avance Encryption Stanar. Springer Verlag, 22. [2] H. Fan an M. A. Hasan. A New Approach to Sub-quaratic Space Complexity Parallel Multipliers for Extene Binary Fiels. IEEE Trans. Computers, 56(2): , September 27. [3] Haining Fan, Jiaguang Sun, Ming Gu, an Kwok-Yan Lam. Overlap-free karatsuba-ofman polynomial multiplication algorithms. Cryptology eprint Archive, Report 27/393, 27. [4] G. Guajaro, T. Guneysu, C. Paar,, S. Kumar, an J. Pelzl. Efficient Harware Implementation of Finite Fiels with Applications to Cryptography. Acta Applicanae Mathematicae, 93(1-3):75 118, September 26. [5] M. A Hasan, M. Wang, an V. K. Bhargava. A Moifie Massey-Omura Parallel Multiplier for a Class of Finite Fiels. IEEE Trans. Computers, 42(1): , [6] N. Koblitz. Elliptic curve cryptosystems. Mathematics of Computation, 48:23 29, [7] M. Leone. A New Low Complexity Parallel Multiplier for a Class of Finite Fiels. In Proceeings of CHES 1, pages 16 17, Lonon, UK, 21. Springer-Verlag. [8] E. Mastrovito. VLSI Designs for Multiplication over Finite Fiels F (2 m ). In 6th International Conference on Applie Algebra, Algebraic Algorithm an Error-Correcting Coes (AAECC-6), pages , [9] V. Miller. Use of elliptic curves in cryptography. In Avances in Cryptology, proceeing s of CRYPTO 85, volume 218 of LNCS, pages Springer-Verlag,

13 [1] C. Paar. A New Architecture for a Parallel Finite Fiel Multiplier with Low Complexity Base on Composite Fiels. IEEE Trans. Comput., 45(7): , [11] A. Reyhani-Masoleh. A New Bit-Serial Architecture for Fiel Multiplication Using Polynomial Bases. In CHES 28, pages 3 314, 28. [12] L. Song an K. K. Parhi. Low-Energy Digit-Serial/Parallel Finite Fiel Multipliers. J. VLSI Signal Process. Syst., 19(2): , [13] B. Sunar an C. Koc. Mastrovito Multiplier for All Trinomials. IEEE Trans. Computers, 48(5): , [14] M. Wang an I. F. Blake. Bit serial multiplication in finite fiels. SIAM J. Discret. Math., 3(1):14 148,

Efficient Subquadratic Space Complexity Binary Polynomial Multipliers Based On Block Recombination

Efficient Subquadratic Space Complexity Binary Polynomial Multipliers Based On Block Recombination Efficient Subquadratic Space Complexity Binary Polynomial Multipliers Based On Block Recombination Murat Cenk, Anwar Hasan, Christophe Negre To cite this version: Murat Cenk, Anwar Hasan, Christophe Negre.

More information

A New Bit-Serial Architecture for Field Multiplication Using Polynomial Bases

A New Bit-Serial Architecture for Field Multiplication Using Polynomial Bases A New Bit-Serial Architecture for Field Multiplication Using Polynomial Bases Arash Reyhani-Masoleh Department of Electrical and Computer Engineering The University of Western Ontario London, Ontario,

More information

Low complexity bit-parallel GF (2 m ) multiplier for all-one polynomials

Low complexity bit-parallel GF (2 m ) multiplier for all-one polynomials Low complexity bit-parallel GF (2 m ) multiplier for all-one polynomials Yin Li 1, Gong-liang Chen 2, and Xiao-ning Xie 1 Xinyang local taxation bureau, Henan, China. Email:yunfeiyangli@gmail.com, 2 School

More information

Subquadratic space complexity multiplier for a class of binary fields using Toeplitz matrix approach

Subquadratic space complexity multiplier for a class of binary fields using Toeplitz matrix approach Subquadratic space complexity multiplier for a class of binary fields using Toeplitz matrix approach M A Hasan 1 and C Negre 2 1 ECE Department and CACR, University of Waterloo, Ontario, Canada 2 Team

More information

FPGA accelerated multipliers over binary composite fields constructed via low hamming weight irreducible polynomials

FPGA accelerated multipliers over binary composite fields constructed via low hamming weight irreducible polynomials FPGA accelerated multipliers over binary composite fields constructed via low hamming weight irreducible polynomials C. Shu, S. Kwon and K. Gaj Abstract: The efficient design of digit-serial multipliers

More information

A new class of irreducible pentanomials for polynomial based multipliers in binary fields

A new class of irreducible pentanomials for polynomial based multipliers in binary fields Noname manuscript No. (will be inserted by the editor) A new class of irreducible pentanomials for polynomial based multipliers in binary fields Gustavo Banegas Ricardo Custódio Daniel Panario the date

More information

High Performance GHASH Function for Long Messages

High Performance GHASH Function for Long Messages High Performance GHASH Function for Long Messages Nicolas Méloni, Christophe Negre, M. Anwar Hasan To cite this version: Nicolas Méloni, Christophe Negre, M. Anwar Hasan. High Performance GHASH Function

More information

Arithmetic Distributions of Convergents Arising from Jacobi-Perron Algorithm

Arithmetic Distributions of Convergents Arising from Jacobi-Perron Algorithm Arithmetic Distributions of Convergents Arising from Jacobi-Perron Algorithm Valerie Berthe, H Nakaa, R Natsui To cite this version: Valerie Berthe, H Nakaa, R Natsui Arithmetic Distributions of Convergents

More information

Subquadratic Computational Complexity Schemes for Extended Binary Field Multiplication Using Optimal Normal Bases

Subquadratic Computational Complexity Schemes for Extended Binary Field Multiplication Using Optimal Normal Bases 1 Subquadratic Computational Complexity Schemes for Extended Binary Field Multiplication Using Optimal Normal Bases H. Fan and M. A. Hasan March 31, 2007 Abstract Based on a recently proposed Toeplitz

More information

PARALLEL MULTIPLICATION IN F 2

PARALLEL MULTIPLICATION IN F 2 PARALLEL MULTIPLICATION IN F 2 n USING CONDENSED MATRIX REPRESENTATION Christophe Negre Équipe DALI, LP2A, Université de Perpignan avenue P Alduy, 66 000 Perpignan, France christophenegre@univ-perpfr Keywords:

More information

A new class of irreducible pentanomials for polynomial based multipliers in binary fields

A new class of irreducible pentanomials for polynomial based multipliers in binary fields Noname manuscript No. (will be inserted by the editor) A new class of irreducible pentanomials for polynomial based multipliers in binary fields Gustavo Banegas Ricardo Custódio Daniel Panario the date

More information

Spectral Modular Arithmetic for Binary Extension Fields

Spectral Modular Arithmetic for Binary Extension Fields 2011 International Conference on Information an Computer Networks (ICICN 2011) Spectral Moular Arithmetic for Binary Extension Fiels Gokay Salamli MIS epartment, Bogazici University 34342 Bebek, Istanbul,

More information

SYNCHRONOUS SEQUENTIAL CIRCUITS

SYNCHRONOUS SEQUENTIAL CIRCUITS CHAPTER SYNCHRONOUS SEUENTIAL CIRCUITS Registers an counters, two very common synchronous sequential circuits, are introuce in this chapter. Register is a igital circuit for storing information. Contents

More information

A New Approach to Subquadratic Space Complexity Parallel Multipliers for Extended Binary Fields

A New Approach to Subquadratic Space Complexity Parallel Multipliers for Extended Binary Fields 1 A New Approach to Subquadratic Space Complexity Parallel Multipliers for Extended Binary Fields Haining Fan and M. Anwar Hasan Senior Member, IEEE July 19, 2006 Abstract Based on Toeplitz matrix-vector

More information

BINARY extension fields GF (2 m ) are heavily used

BINARY extension fields GF (2 m ) are heavily used This article has been accepte for publication in a future issue of this journal, but has not been fully eite. Content ay change prior to final publication. Citation inforation: DOI 0.09/TC.205.248408,

More information

Subquadratic Space Complexity Multiplication over Binary Fields with Dickson Polynomial Representation

Subquadratic Space Complexity Multiplication over Binary Fields with Dickson Polynomial Representation Subquadratic Space Complexity Multiplication over Binary Fields with Dickson Polynomial Representation M A Hasan and C Negre Abstract We study Dickson bases for binary field representation Such representation

More information

New Bit-Level Serial GF (2 m ) Multiplication Using Polynomial Basis

New Bit-Level Serial GF (2 m ) Multiplication Using Polynomial Basis 2015 IEEE 22nd Symposium on Computer Arithmetic New Bit-Level Serial GF 2 m ) Multiplication Using Polynomial Basis Hayssam El-Razouk and Arash Reyhani-Masoleh Department of Electrical and Computer Engineering

More information

TIME-DELAY ESTIMATION USING FARROW-BASED FRACTIONAL-DELAY FIR FILTERS: FILTER APPROXIMATION VS. ESTIMATION ERRORS

TIME-DELAY ESTIMATION USING FARROW-BASED FRACTIONAL-DELAY FIR FILTERS: FILTER APPROXIMATION VS. ESTIMATION ERRORS TIME-DEAY ESTIMATION USING FARROW-BASED FRACTIONA-DEAY FIR FITERS: FITER APPROXIMATION VS. ESTIMATION ERRORS Mattias Olsson, Håkan Johansson, an Per öwenborg Div. of Electronic Systems, Dept. of Electrical

More information

A New Approach to Subquadratic Space Complexity Parallel Multipliers for Extended Binary Fields

A New Approach to Subquadratic Space Complexity Parallel Multipliers for Extended Binary Fields 1 A New Approach to Subquadratic Space Complexity Parallel Multipliers for Extended Binary Fields Haining Fan and M. Anwar Hasan Senior Member, IEEE January 5, 2006 Abstract Based on Toeplitz matrix-vector

More information

Efficient RNS bases for Cryptography

Efficient RNS bases for Cryptography 1 Efficient RNS bases for Cryptography Jean-Claue Bajar, Nicolas Meloni an Thomas Plantar LIRMM UMR 5506, University of Montpellier, France, {bajar,meloni,plantar}@lirmm.fr Abstract Resiue Number Systems

More information

BSIDES multiplication, squaring is also an important

BSIDES multiplication, squaring is also an important 1 Bit-Parallel GF ( n ) Squarer Using Shifted Polynomial Basis Xi Xiong and Haining Fan Abstract We present explicit formulae and complexities of bit-parallel shifted polynomial basis (SPB) squarers in

More information

Montgomery Multiplier and Squarer in GF(2 m )

Montgomery Multiplier and Squarer in GF(2 m ) Montgomery Multiplier and Squarer in GF( m ) Huapeng Wu The Centre for Applied Cryptographic Research Department of Combinatorics and Optimization University of Waterloo, Waterloo, Canada h3wu@cacrmathuwaterlooca

More information

arxiv: v1 [cs.ds] 31 May 2017

arxiv: v1 [cs.ds] 31 May 2017 Succinct Partial Sums an Fenwick Trees Philip Bille, Aners Roy Christiansen, Nicola Prezza, an Freerik Rye Skjoljensen arxiv:1705.10987v1 [cs.ds] 31 May 2017 Technical University of Denmark, DTU Compute,

More information

Reducing the Complexity of Normal Basis Multiplication

Reducing the Complexity of Normal Basis Multiplication Reducing the Complexity of Normal Basis Multiplication Ömer Eǧecioǧlu and Çetin Kaya Koç Department of Computer Science University of California Santa Barbara {omer,koc}@cs.ucsb.edu Abstract In this paper

More information

Revisiting Finite Field Multiplication Using Dickson Bases

Revisiting Finite Field Multiplication Using Dickson Bases Revisiting Finite Field Multiplication Using Dickson Bases Bijan Ansari and M. Anwar Hasan Department of Electrical and Computer Engineering University of Waterloo, Waterloo, Ontario, Canada {bansari,

More information

On one class of permutation polynomials over finite fields of characteristic two *

On one class of permutation polynomials over finite fields of characteristic two * On one class of permutation polynomials over finite fields of characteristic two * Leonid Bassalygo, Victor A. Zinoviev To cite this version: Leonid Bassalygo, Victor A. Zinoviev. On one class of permutation

More information

Are standards compliant Elliptic Curve Cryptosystems feasible on RFID?

Are standards compliant Elliptic Curve Cryptosystems feasible on RFID? Are standards compliant Elliptic Curve Cryptosystems feasible on RFID? Sandeep S. Kumar and Christof Paar Horst Görtz Institute for IT Security, Ruhr-Universität Bochum, Germany Abstract. With elliptic

More information

Hardware Operator for Simultaneous Sine and Cosine Evaluation

Hardware Operator for Simultaneous Sine and Cosine Evaluation Hardware Operator for Simultaneous Sine and Cosine Evaluation Arnaud Tisserand To cite this version: Arnaud Tisserand. Hardware Operator for Simultaneous Sine and Cosine Evaluation. ICASSP 6: International

More information

The Accelerated Euclidean Algorithm

The Accelerated Euclidean Algorithm The Accelerated Euclidean Algorithm Sidi Mohamed Sedjelmaci To cite this version: Sidi Mohamed Sedjelmaci The Accelerated Euclidean Algorithm Laureano Gonzales-Vega and Thomas Recio Eds 2004, University

More information

We G Model Reduction Approaches for Solution of Wave Equations for Multiple Frequencies

We G Model Reduction Approaches for Solution of Wave Equations for Multiple Frequencies We G15 5 Moel Reuction Approaches for Solution of Wave Equations for Multiple Frequencies M.Y. Zaslavsky (Schlumberger-Doll Research Center), R.F. Remis* (Delft University) & V.L. Druskin (Schlumberger-Doll

More information

CMSC 313 Preview Slides

CMSC 313 Preview Slides CMSC 33 Preview Slies These are raft slies. The actual slies presente in lecture may be ifferent ue to last minute changes, scheule slippage,... UMBC, CMSC33, Richar Chang CMSC 33 Lecture

More information

Introduction EE 224: INTRODUCTION TO DIGITAL CIRCUITS & COMPUTER DESIGN. Lecture 6: Sequential Logic 3 Registers & Counters 5/9/2010

Introduction EE 224: INTRODUCTION TO DIGITAL CIRCUITS & COMPUTER DESIGN. Lecture 6: Sequential Logic 3 Registers & Counters 5/9/2010 EE 224: INTROUCTION TO IGITAL CIRCUITS & COMPUTER ESIGN Lecture 6: Sequential Logic 3 Registers & Counters 05/10/2010 Avinash Kodi, kodi@ohio.edu Introduction 2 A Flip-Flop stores one bit of information

More information

High Performance GHASH Function for Long Messages

High Performance GHASH Function for Long Messages High Performance GHASH Function for Long Messages Nicolas Méloni 1, Christophe Négre 2 and M. Anwar Hasan 1 1 Department of Electrical and Computer Engineering University of Waterloo, Canada 2 Team DALI/ELIAUS

More information

On the Enumeration of Double-Base Chains with Applications to Elliptic Curve Cryptography

On the Enumeration of Double-Base Chains with Applications to Elliptic Curve Cryptography On the Enumeration of Double-Base Chains with Applications to Elliptic Curve Cryptography Christophe Doche Department of Computing Macquarie University, Australia christophe.oche@mq.eu.au. Abstract. The

More information

Factorisation of RSA-704 with CADO-NFS

Factorisation of RSA-704 with CADO-NFS Factorisation of RSA-704 with CADO-NFS Shi Bai, Emmanuel Thomé, Paul Zimmermann To cite this version: Shi Bai, Emmanuel Thomé, Paul Zimmermann. Factorisation of RSA-704 with CADO-NFS. 2012. HAL Id: hal-00760322

More information

Lecture 2 Lagrangian formulation of classical mechanics Mechanics

Lecture 2 Lagrangian formulation of classical mechanics Mechanics Lecture Lagrangian formulation of classical mechanics 70.00 Mechanics Principle of stationary action MATH-GA To specify a motion uniquely in classical mechanics, it suffices to give, at some time t 0,

More information

A new simple recursive algorithm for finding prime numbers using Rosser s theorem

A new simple recursive algorithm for finding prime numbers using Rosser s theorem A new simple recursive algorithm for finding prime numbers using Rosser s theorem Rédoane Daoudi To cite this version: Rédoane Daoudi. A new simple recursive algorithm for finding prime numbers using Rosser

More information

A Simple Proof of P versus NP

A Simple Proof of P versus NP A Simple Proof of P versus NP Frank Vega To cite this version: Frank Vega. A Simple Proof of P versus NP. 2016. HAL Id: hal-01281254 https://hal.archives-ouvertes.fr/hal-01281254 Submitted

More information

. Using a multinomial model gives us the following equation for P d. , with respect to same length term sequences.

. Using a multinomial model gives us the following equation for P d. , with respect to same length term sequences. S 63 Lecture 8 2/2/26 Lecturer Lillian Lee Scribes Peter Babinski, Davi Lin Basic Language Moeling Approach I. Special ase of LM-base Approach a. Recap of Formulas an Terms b. Fixing θ? c. About that Multinomial

More information

Reactive Power Compensation in Mechanical Systems

Reactive Power Compensation in Mechanical Systems Reactive Power Compensation in Mechanical Systems Carlos Rengifo, Bassel Kaar, Yannick Aoustin, Christine Chevallereau To cite this version: Carlos Rengifo, Bassel Kaar, Yannick Aoustin, Christine Chevallereau.

More information

Linear First-Order Equations

Linear First-Order Equations 5 Linear First-Orer Equations Linear first-orer ifferential equations make up another important class of ifferential equations that commonly arise in applications an are relatively easy to solve (in theory)

More information

Analysis of Boyer and Moore s MJRTY algorithm

Analysis of Boyer and Moore s MJRTY algorithm Analysis of Boyer and Moore s MJRTY algorithm Laurent Alonso, Edward M. Reingold To cite this version: Laurent Alonso, Edward M. Reingold. Analysis of Boyer and Moore s MJRTY algorithm. Information Processing

More information

Least-Squares Regression on Sparse Spaces

Least-Squares Regression on Sparse Spaces Least-Squares Regression on Sparse Spaces Yuri Grinberg, Mahi Milani Far, Joelle Pineau School of Computer Science McGill University Montreal, Canaa {ygrinb,mmilan1,jpineau}@cs.mcgill.ca 1 Introuction

More information

Closed loop observer-based parameter estimation of quantum systems with a single population measurement

Closed loop observer-based parameter estimation of quantum systems with a single population measurement Close loop observer-base parameter estimation of quantum systems with a single population measurement Zaki Leghtas To cite this version: Zaki Leghtas. Close loop observer-base parameter estimation of quantum

More information

Consider for simplicity a 3rd-order IIR filter with a transfer function. where

Consider for simplicity a 3rd-order IIR filter with a transfer function. where Basic IIR Digital Filter The causal IIR igital filters we are concerne with in this course are characterie by a real rational transfer function of or, equivalently by a constant coefficient ifference equation

More information

Mastrovito Form of Non-recursive Karatsuba Multiplier for All Trinomials

Mastrovito Form of Non-recursive Karatsuba Multiplier for All Trinomials 1 Mastrovito Form of Non-recursive Karatsuba Multiplier for All Trinomials Yin Li, Xingpo Ma, Yu Zhang and Chuanda Qi Abstract We present a new type of bit-parallel non-recursive Karatsuba multiplier over

More information

Basic IIR Digital Filter Structures

Basic IIR Digital Filter Structures Basic IIR Digital Filter Structures The causal IIR igital filters we are concerne with in this course are characterie by a real rational transfer function of or, equivalently by a constant coefficient

More information

Implicit Differentiation

Implicit Differentiation Implicit Differentiation Thus far, the functions we have been concerne with have been efine explicitly. A function is efine explicitly if the output is given irectly in terms of the input. For instance,

More information

On Newton-Raphson iteration for multiplicative inverses modulo prime powers

On Newton-Raphson iteration for multiplicative inverses modulo prime powers On Newton-Raphson iteration for multiplicative inverses modulo prime powers Jean-Guillaume Dumas To cite this version: Jean-Guillaume Dumas. On Newton-Raphson iteration for multiplicative inverses modulo

More information

GCD of Random Linear Combinations

GCD of Random Linear Combinations JOACHIM VON ZUR GATHEN & IGOR E. SHPARLINSKI (2006). GCD of Ranom Linear Combinations. Algorithmica 46(1), 137 148. ISSN 0178-4617 (Print), 1432-0541 (Online). URL https://x.oi.org/10.1007/s00453-006-0072-1.

More information

Efficient Digit-Serial Normal Basis Multipliers over Binary Extension Fields

Efficient Digit-Serial Normal Basis Multipliers over Binary Extension Fields Efficient Digit-Serial Normal Basis Multipliers over Binary Extension Fields ARASH REYHANI-MASOLEH and M. ANWAR HASAN University of Waterloo In this article, two digit-serial architectures for normal basis

More information

AN IMPROVED LOW LATENCY SYSTOLIC STRUCTURED GALOIS FIELD MULTIPLIER

AN IMPROVED LOW LATENCY SYSTOLIC STRUCTURED GALOIS FIELD MULTIPLIER Indian Journal of Electronics and Electrical Engineering (IJEEE) Vol.2.No.1 2014pp1-6 available at: www.goniv.com Paper Received :05-03-2014 Paper Published:28-03-2014 Paper Reviewed by: 1. John Arhter

More information

Exact Comparison of Quadratic Irrationals

Exact Comparison of Quadratic Irrationals Exact Comparison of Quadratic Irrationals Phuc Ngo To cite this version: Phuc Ngo. Exact Comparison of Quadratic Irrationals. [Research Report] LIGM. 20. HAL Id: hal-0069762 https://hal.archives-ouvertes.fr/hal-0069762

More information

'HVLJQ &RQVLGHUDWLRQ LQ 0DWHULDO 6HOHFWLRQ 'HVLJQ 6HQVLWLYLW\,1752'8&7,21

'HVLJQ &RQVLGHUDWLRQ LQ 0DWHULDO 6HOHFWLRQ 'HVLJQ 6HQVLWLYLW\,1752'8&7,21 Large amping in a structural material may be either esirable or unesirable, epening on the engineering application at han. For example, amping is a esirable property to the esigner concerne with limiting

More information

Section 7.1: Integration by Parts

Section 7.1: Integration by Parts Section 7.1: Integration by Parts 1. Introuction to Integration Techniques Unlike ifferentiation where there are a large number of rules which allow you (in principle) to ifferentiate any function, the

More information

Two Dimensional Linear Phase Multiband Chebyshev FIR Filter

Two Dimensional Linear Phase Multiband Chebyshev FIR Filter Two Dimensional Linear Phase Multiband Chebyshev FIR Filter Vinay Kumar, Bhooshan Sunil To cite this version: Vinay Kumar, Bhooshan Sunil. Two Dimensional Linear Phase Multiband Chebyshev FIR Filter. Acta

More information

A New Vulnerable Class of Exponents in RSA

A New Vulnerable Class of Exponents in RSA A ew Vulnerable Class of Exponents in RSA Aberrahmane itaj Laboratoire e Mathématiues icolas Oresme Campus II, Boulevar u Maréchal Juin BP 586, 4032 Caen Ceex, France. nitaj@math.unicaen.fr http://www.math.unicaen.fr/~nitaj

More information

d dx But have you ever seen a derivation of these results? We ll prove the first result below. cos h 1

d dx But have you ever seen a derivation of these results? We ll prove the first result below. cos h 1 Lecture 5 Some ifferentiation rules Trigonometric functions (Relevant section from Stewart, Seventh Eition: Section 3.3) You all know that sin = cos cos = sin. () But have you ever seen a erivation of

More information

COUNTING VALUE SETS: ALGORITHM AND COMPLEXITY

COUNTING VALUE SETS: ALGORITHM AND COMPLEXITY COUNTING VALUE SETS: ALGORITHM AND COMPLEXITY QI CHENG, JOSHUA E. HILL, AND DAQING WAN Abstract. Let p be a prime. Given a polynomial in F p m[x] of egree over the finite fiel F p m, one can view it as

More information

On size, radius and minimum degree

On size, radius and minimum degree On size, radius and minimum degree Simon Mukwembi To cite this version: Simon Mukwembi. On size, radius and minimum degree. Discrete Mathematics and Theoretical Computer Science, DMTCS, 2014, Vol. 16 no.

More information

Sparse multivariate factorization by mean of a few bivariate factorizations

Sparse multivariate factorization by mean of a few bivariate factorizations Sparse multivariate factorization by mean of a few bivariate factorizations Bernard Parisse To cite this version: Bernard Parisse. Sparse multivariate factorization by mean of a few bivariate factorizations.

More information

Easter bracelets for years

Easter bracelets for years Easter bracelets for 5700000 years Denis Roegel To cite this version: Denis Roegel. Easter bracelets for 5700000 years. [Research Report] 2014. HAL Id: hal-01009457 https://hal.inria.fr/hal-01009457

More information

Sensitivity of hybrid filter banks A/D converters to analog realization errors and finite word length

Sensitivity of hybrid filter banks A/D converters to analog realization errors and finite word length Sensitivity of hybrid filter banks A/D converters to analog realization errors and finite word length Tudor Petrescu, Jacques Oksman To cite this version: Tudor Petrescu, Jacques Oksman. Sensitivity of

More information

Iterative Karatsuba For Multivariate Polynomial Multiplication

Iterative Karatsuba For Multivariate Polynomial Multiplication Iterative Karatsuba For Multivariate Polynomial Multiplication Alberto Zanoni Centro Vito Volterra Università i Roma Tor Vergata Via Columbia 2 033 Roma, Italy zanoni@volterra.uniroma2.it Abstract. This

More information

A check digit system over a group of arbitrary order

A check digit system over a group of arbitrary order 2013 8th International Conference on Communications an Networking in China (CHINACOM) A check igit system over a group of arbitrary orer Yanling Chen Chair of Communication Systems Ruhr University Bochum

More information

Implementation Options for Finite Field Arithmetic for Elliptic Curve Cryptosystems Christof Paar Electrical & Computer Engineering Dept. and Computer Science Dept. Worcester Polytechnic Institute Worcester,

More information

Efficient Hardware Implementation of Finite Fields with Applications to Cryptography

Efficient Hardware Implementation of Finite Fields with Applications to Cryptography Acta Appl Math (2006) 93: 75 118 DOI 10.1007/s10440-006-9072-z Efficient Hardware Implementation of Finite Fields with Applications to Cryptography Jorge Guajardo Tim Güneysu Sandeep S. Kumar Christof

More information

Efficient FPGA Implementation of Gaussian Noise Generator for Communication Channel Emulation

Efficient FPGA Implementation of Gaussian Noise Generator for Communication Channel Emulation Efficient FPGA Implementation of Gaussian Noise Generator for Communication Channel Emulation Jean-Luc anger, Adel Ghazel, Emmanuel Boutillon, H. Laamari To cite this version: Jean-Luc anger, Adel Ghazel,

More information

Survey Sampling. 1 Design-based Inference. Kosuke Imai Department of Politics, Princeton University. February 19, 2013

Survey Sampling. 1 Design-based Inference. Kosuke Imai Department of Politics, Princeton University. February 19, 2013 Survey Sampling Kosuke Imai Department of Politics, Princeton University February 19, 2013 Survey sampling is one of the most commonly use ata collection methos for social scientists. We begin by escribing

More information

LATTICE-BASED D-OPTIMUM DESIGN FOR FOURIER REGRESSION

LATTICE-BASED D-OPTIMUM DESIGN FOR FOURIER REGRESSION The Annals of Statistics 1997, Vol. 25, No. 6, 2313 2327 LATTICE-BASED D-OPTIMUM DESIGN FOR FOURIER REGRESSION By Eva Riccomagno, 1 Rainer Schwabe 2 an Henry P. Wynn 1 University of Warwick, Technische

More information

SUBQUADRATIC BINARY FIELD MULTIPLIER IN DOUBLE POLYNOMIAL SYSTEM

SUBQUADRATIC BINARY FIELD MULTIPLIER IN DOUBLE POLYNOMIAL SYSTEM SUBQUADRATIC BINARY FIELD MULTIPLIER IN DOUBLE POLYNOMIAL SYSTEM Pascal Giorgi, Christophe Nègre 2 Équipe DALI, LP2A, Unversité de Perpignan avenue P. Alduy, F66860 Perpignan, France () pascal.giorgi@univ-perp.fr,

More information

LEGENDRE TYPE FORMULA FOR PRIMES GENERATED BY QUADRATIC POLYNOMIALS

LEGENDRE TYPE FORMULA FOR PRIMES GENERATED BY QUADRATIC POLYNOMIALS Ann. Sci. Math. Québec 33 (2009), no 2, 115 123 LEGENDRE TYPE FORMULA FOR PRIMES GENERATED BY QUADRATIC POLYNOMIALS TAKASHI AGOH Deicate to Paulo Ribenboim on the occasion of his 80th birthay. RÉSUMÉ.

More information

Modular composition modulo triangular sets and applications

Modular composition modulo triangular sets and applications Moular composition moulo triangular sets an applications Arien Poteaux Éric Schost arien.poteaux@lip6.fr eschost@uwo.ca : Computer Science Department, The University of Western Ontario, Lonon, ON, Canaa

More information

Multi-edge Optimization of Low-Density Parity-Check Codes for Joint Source-Channel Coding

Multi-edge Optimization of Low-Density Parity-Check Codes for Joint Source-Channel Coding Multi-ege Optimization of Low-Density Parity-Check Coes for Joint Source-Channel Coing H. V. Beltrão Neto an W. Henkel Jacobs University Bremen Campus Ring 1 D-28759 Bremen, Germany Email: {h.beltrao,

More information

Unit #6 - Families of Functions, Taylor Polynomials, l Hopital s Rule

Unit #6 - Families of Functions, Taylor Polynomials, l Hopital s Rule Unit # - Families of Functions, Taylor Polynomials, l Hopital s Rule Some problems an solutions selecte or aapte from Hughes-Hallett Calculus. Critical Points. Consier the function f) = 54 +. b) a) Fin

More information

Learning an Adaptive Dictionary Structure for Efficient Image Sparse Coding

Learning an Adaptive Dictionary Structure for Efficient Image Sparse Coding Learning an Adaptive Dictionary Structure for Efficient Image Sparse Coding Jérémy Aghaei Mazaheri, Christine Guillemot, Claude Labit To cite this version: Jérémy Aghaei Mazaheri, Christine Guillemot,

More information

Outcomes. Unit 14. Review of State Machines STATE MACHINES OVERVIEW. State Machine Design

Outcomes. Unit 14. Review of State Machines STATE MACHINES OVERVIEW. State Machine Design 4. Outcomes 4.2 Unit 4 tate Machine Design I can create a state iagram to solve a sequential problem I can implement a working state machine given a state iagram 4.3 Review of tate Machines 4.4 TATE MACHINE

More information

Why Bernstein Polynomials Are Better: Fuzzy-Inspired Justification

Why Bernstein Polynomials Are Better: Fuzzy-Inspired Justification Why Bernstein Polynomials Are Better: Fuzzy-Inspire Justification Jaime Nava 1, Olga Kosheleva 2, an Vlaik Kreinovich 3 1,3 Department of Computer Science 2 Department of Teacher Eucation University of

More information

A Digit-Serial Systolic Multiplier for Finite Fields GF(2 m )

A Digit-Serial Systolic Multiplier for Finite Fields GF(2 m ) A Digit-Serial Systolic Multiplier for Finite Fields GF( m ) Chang Hoon Kim, Sang Duk Han, and Chun Pyo Hong Department of Computer and Information Engineering Taegu University 5 Naeri, Jinryang, Kyungsan,

More information

2Algebraic ONLINE PAGE PROOFS. foundations

2Algebraic ONLINE PAGE PROOFS. foundations Algebraic founations. Kick off with CAS. Algebraic skills.3 Pascal s triangle an binomial expansions.4 The binomial theorem.5 Sets of real numbers.6 Surs.7 Review . Kick off with CAS Playing lotto Using

More information

Efficient multiplication using type 2 optimal normal bases

Efficient multiplication using type 2 optimal normal bases Efficient multiplication using type 2 optimal normal bases Joachim von zur Gathen 1, Amin Shokrollahi 2, and Jamshid Shokrollahi 3 1 B-IT, Dahlmannstr. 2, Universität Bonn, 53113 Bonn, Germany gathen@bit.uni-bonn.de

More information

Diagonalization of Matrices Dr. E. Jacobs

Diagonalization of Matrices Dr. E. Jacobs Diagonalization of Matrices Dr. E. Jacobs One of the very interesting lessons in this course is how certain algebraic techniques can be use to solve ifferential equations. The purpose of these notes is

More information

Decoding A Counter. svbitec.wordpress.com 1

Decoding A Counter. svbitec.wordpress.com 1 ecoding A ounter ecoding a counter involves determining which state in the sequence the counter is in. ifferentiate between active-high and active-low decoding. Active-HIGH decoding: output HIGH if the

More information

Computing the Longest Common Subsequence of Multiple RLE Strings

Computing the Longest Common Subsequence of Multiple RLE Strings The 29th Workshop on Combinatorial Mathematics an Computation Theory Computing the Longest Common Subsequence of Multiple RLE Strings Ling-Chih Yao an Kuan-Yu Chen Grauate Institute of Networking an Multimeia

More information

Table of Common Derivatives By David Abraham

Table of Common Derivatives By David Abraham Prouct an Quotient Rules: Table of Common Derivatives By Davi Abraham [ f ( g( ] = [ f ( ] g( + f ( [ g( ] f ( = g( [ f ( ] g( g( f ( [ g( ] Trigonometric Functions: sin( = cos( cos( = sin( tan( = sec

More information

x f(x) x f(x) approaching 1 approaching 0.5 approaching 1 approaching 0.

x f(x) x f(x) approaching 1 approaching 0.5 approaching 1 approaching 0. Engineering Mathematics 2 26 February 2014 Limits of functions Consier the function 1 f() = 1. The omain of this function is R + \ {1}. The function is not efine at 1. What happens when is close to 1?

More information

Design at the Register Transfer Level

Design at the Register Transfer Level Week-7 Design at the Register Transfer Level Algorithmic State Machines Algorithmic State Machine (ASM) q Our design methodologies do not scale well to real-world problems. q 232 - Logic Design / Algorithmic

More information

Digital Logic Design. Midterm #2

Digital Logic Design. Midterm #2 EECS: igital Logic esign r. nthony. Johnson f5m2s_il7.fm - igital Logic esign Miterm #2 Problems Points. 5 2. 4 3. 6 Total 5 Was the exam fair? yes no EECS: igital Logic esign r. nthony. Johnson f5m2s_il7.fm

More information

Full-order observers for linear systems with unknown inputs

Full-order observers for linear systems with unknown inputs Full-order observers for linear systems with unknown inputs Mohamed Darouach, Michel Zasadzinski, Shi Jie Xu To cite this version: Mohamed Darouach, Michel Zasadzinski, Shi Jie Xu. Full-order observers

More information

On infinite permutations

On infinite permutations On infinite permutations Dmitri G. Fon-Der-Flaass, Anna E. Frid To cite this version: Dmitri G. Fon-Der-Flaass, Anna E. Frid. On infinite permutations. Stefan Felsner. 2005 European Conference on Combinatorics,

More information

Hook lengths and shifted parts of partitions

Hook lengths and shifted parts of partitions Hook lengths and shifted parts of partitions Guo-Niu Han To cite this version: Guo-Niu Han Hook lengths and shifted parts of partitions The Ramanujan Journal, 009, 9 p HAL Id: hal-00395690

More information

Linear and quadratic approximation

Linear and quadratic approximation Linear an quaratic approximation November 11, 2013 Definition: Suppose f is a function that is ifferentiable on an interval I containing the point a. The linear approximation to f at a is the linear function

More information

Fundamentals of Digital Design

Fundamentals of Digital Design Fundamentals of Digital Design Digital Radiation Measurement and Spectroscopy NE/RHP 537 1 Binary Number System The binary numeral system, or base-2 number system, is a numeral system that represents numeric

More information

High rate soft output Viterbi decoder

High rate soft output Viterbi decoder High rate soft output Viterbi decoder Eric Lüthi, Emmanuel Casseau Integrated Circuits for Telecommunications Laboratory Ecole Nationale Supérieure des Télécomunications de Bretagne BP 83-985 Brest Cedex

More information

Two formulas for the Euler ϕ-function

Two formulas for the Euler ϕ-function Two formulas for the Euler ϕ-function Robert Frieman A multiplication formula for ϕ(n) The first formula we want to prove is the following: Theorem 1. If n 1 an n 2 are relatively prime positive integers,

More information

Karatsuba with Rectangular Multipliers for FPGAs

Karatsuba with Rectangular Multipliers for FPGAs Karatsuba with Rectangular Multipliers for FPGAs Martin Kumm, Oscar Gustafsson, Florent De Dinechin, Johannes Kappauf, Peter Zipf To cite this version: Martin Kumm, Oscar Gustafsson, Florent De Dinechin,

More information

A proximal approach to the inversion of ill-conditioned matrices

A proximal approach to the inversion of ill-conditioned matrices A proximal approach to the inversion of ill-conditioned matrices Pierre Maréchal, Aude Rondepierre To cite this version: Pierre Maréchal, Aude Rondepierre. A proximal approach to the inversion of ill-conditioned

More information

NILPOTENCE ORDER GROWTH OF RECURSION OPERATORS IN CHARACTERISTIC p. Contents. 1. Introduction Preliminaries 3. References

NILPOTENCE ORDER GROWTH OF RECURSION OPERATORS IN CHARACTERISTIC p. Contents. 1. Introduction Preliminaries 3. References NILPOTENCE ORDER GROWTH OF RECURSION OPERATORS IN CHARACTERISTIC p ANNA MEDVEDOVSKY Abstract. We prove that the killing rate of certain egree-lowering recursion operators on a polynomial algebra over a

More information

Methylation-associated PHOX2B gene silencing is a rare event in human neuroblastoma.

Methylation-associated PHOX2B gene silencing is a rare event in human neuroblastoma. Methylation-associated PHOX2B gene silencing is a rare event in human neuroblastoma. Loïc De Pontual, Delphine Trochet, Franck Bourdeaut, Sophie Thomas, Heather Etchevers, Agnes Chompret, Véronique Minard,

More information

Time Allowed 3:00 hrs. April, pages

Time Allowed 3:00 hrs. April, pages IGITAL ESIGN COEN 32 Prof. r. A. J. Al-Khalili Time Allowed 3: hrs. April, 998 2 pages Answer All uestions No materials are allowed uestion a) esign a half subtractor b) esign a full subtractor c) Using

More information