FPGA Implementation of Point Multiplication on Koblitz Curves Using Kleinian Integers

Size: px
Start display at page:

Download "FPGA Implementation of Point Multiplication on Koblitz Curves Using Kleinian Integers"

Transcription

1 FPGA Ipleentation of Point Multiplication on Koblitz Curves Using Kleinian Integers V.S. Diitrov 1 K.U. Järvinen 2 M.J. Jacobson, Jr. 3 W.F. Chan 3 Z. Huang 1 February 28, 2012 Diitrov et al. (Univ. Calgary) February 28, / 15

2 Introduction Introduction to Elliptic Curve Cryptography Public-key cryptography ethod which uses a group of points on an elliptic curve, E, defined over a finite field, F q Faster and shorter keys than, e.g., RSA Diitrov et al. (Univ. Calgary) February 28, / 15

3 Introduction Introduction to Elliptic Curve Cryptography Public-key cryptography ethod which uses a group of points on an elliptic curve, E, defined over a finite field, F q Faster and shorter keys than, e.g., RSA Elliptic Curve Point Multiplication Q = kp where k is a positive integer and P =(x, y) is a point on E Coputed with point additions, P 1 + P 2,and point doublings, 2P 1 Diitrov et al. (Univ. Calgary) February 28, / 15

4 Introduction Point Multiplication on Koblitz Curves Koblitz curves Frobenius aps, φ(p 1 ), instead of point doublings faster coputation k ust be converter to τ-adic representation Diitrov et al. (Univ. Calgary) February 28, / 15

5 Introduction Point Multiplication on Koblitz Curves Koblitz curves Frobenius aps, φ(p 1 ), instead of point doublings faster coputation k ust be converter to τ-adic representation Point ultiplication Frobenius ap for all bits of k Point addition if the bit is 1 Diitrov et al. (Univ. Calgary) February 28, / 15

6 Introduction Point Multiplication on Koblitz Curves Koblitz curves Frobenius aps, φ(p 1 ), instead of point doublings faster coputation k ust be converter to τ-adic representation Point ultiplication Exaple Frobenius ap for all bits of k Point addition if the bit is A AAA A AAAA A 10 Diitrov et al. (Univ. Calgary) February 28, / 15

7 Introduction Point Multiplication on Koblitz Curves Koblitz curves Frobenius aps, φ(p 1 ), instead of point doublings faster coputation k ust be converter to τ-adic representation Point ultiplication Exaple Frobenius ap for all bits of k Point addition if the bit is 1, point subtraction if A AAA A AAAA A A A S A A S A 7 Diitrov et al. (Univ. Calgary) February 28, / 15

8 Introduction Koblitz Curves Koblitz curves (defined over F 2 ): E a : y 2 + xy = x 3 + ax 2 +1, a {0, 1} E a (F 2 ) easily coputed for any integer > 0 Frobenius endoorphis τ(x, y) =(x 2, y 2 ): alost free to copute satisfies inial polynoial x 2 µx +2=0whereµ =( 1) 1 a can view τ as a root, i.e., τ =(µ + 7)/2 leads to efficient τ-adic point ultiplication algoriths (eg. τ NAF) Diitrov et al. (Univ. Calgary) February 28, / 15

9 Theoretical Results Double Base Expansions Diitrov, Jullien, Miller (1998): copute kp using k = ±2 a 3 b requires only O(log k/(log log k)) (2, 3)-integers find closest ±2 a 3 b to k, subtract and repeat Our contribution: efficient point ultiplication on Koblitz curves first provably sublinear point ultiplication algorith (3 coplex bases) efficient ethod using bases τ and τ 1 (no proof, conjectural sublinearity) no precoputations based on k or P efficient FPGA ipleentation Diitrov et al. (Univ. Calgary) February 28, / 15

10 Theoretical Results Kleinian Integer Expansions Kleinian integers: x + yτ Z[τ] (τ,τ 1)-Kleinian integers: ±τ a (τ 1) b (τ,τ 1,τ 2 τ 1)-Kleinian integers: ±τ a (τ 1) b (τ 2 τ 1) c Theore: k Z[τ] can be represented by a su of O(log N(k)/(log log N(k))) (τ,τ 1,τ 2 τ 1)-Kleinian integers Conjecture: sae for (τ,τ 1)-Kleinian integers Proof for bases 2 and 3 doesn t generalize (only for real bases) Greedy algorith doesn t generalize well: hard to find closest (τ,τ 1)-Kleinian integer to k Diitrov et al. (Univ. Calgary) February 28, / 15

11 Algoriths Conversion Algorith Copute k = d ±τ a i (τ 1) b i for k Z[τ] i=1 Precoputation: inial representation for every q = 1 Copute unsigned τ-adic expansion of k. 2 Divide τ-adic expansion into blocks of length w. w 1 i=0 d i τ i, d i {0, 1} 3 Substitute each block with inial (τ,τ 1)-expansion ties appropriate power of τ Assuing the conjecture, d and ax(b i ) are both sublinear in log N(k) Diitrov et al. (Univ. Calgary) February 28, / 15

12 Algoriths Exaple k = 6465, E 1 (F 2 163), τ=(1+ 7)/2 partial reduction odulo (τ 163 1)/(τ 1) k ξ = τ Using block size 7 we have: ξ = τ 13 + τ 12 + τ 11 + τ 9 + τ 5 + τ 2 Diitrov et al. (Univ. Calgary) February 28, / 15

13 Exaple Algoriths k = 6465, E 1 (F 2 163), τ=(1+ 7)/2 partial reduction odulo (τ 163 1)/(τ 1) k ξ = τ Using block size 7 we have: ξ = τ 13 + τ 12 + τ 11 + τ 9 + τ 5 + τ 2 = τ 7 τ 6 + τ 5 + τ 4 + τ 2 + τ 5 + τ 2 Diitrov et al. (Univ. Calgary) February 28, / 15

14 Exaple Algoriths k = 6465, E 1 (F 2 163), τ=(1+ 7)/2 partial reduction odulo (τ 163 1)/(τ 1) k ξ = τ Using block size 7 we have: ξ = τ 13 + τ 12 + τ 11 + τ 9 + τ 5 + τ 2 = τ 7 τ 6 + τ 5 + τ 4 + τ 2 + τ 5 + τ 2 = τ 7 τ(τ 1) + τ(τ 1) 6 Diitrov et al. (Univ. Calgary) February 28, / 15

15 Exaple Algoriths k = 6465, E 1 (F 2 163), τ=(1+ 7)/2 partial reduction odulo (τ 163 1)/(τ 1) k ξ = τ Using block size 7 we have: ξ = τ 13 + τ 12 + τ 11 + τ 9 + τ 5 + τ 2 = τ 7 τ 6 + τ 5 + τ 4 + τ 2 + τ 5 + τ 2 = τ 7 τ(τ 1) + τ(τ 1) 6 + τ 2 (τ 1) 2 Diitrov et al. (Univ. Calgary) February 28, / 15

16 Exaple Algoriths k = 6465, E 1 (F 2 163), τ=(1+ 7)/2 partial reduction odulo (τ 163 1)/(τ 1) k ξ = τ Using block size 7 we have: ξ = τ 13 + τ 12 + τ 11 + τ 9 + τ 5 + τ 2 = τ 7 τ 6 + τ 5 + τ 4 + τ 2 + τ 5 + τ 2 = τ 7 τ(τ 1) + τ(τ 1) 6 + τ 2 (τ 1) 2 = τ 8 (τ 1) + τ 8 (τ 1) 6 + τ 2 (τ 1) 2 Diitrov et al. (Univ. Calgary) February 28, / 15

17 Algoriths Point Multiplication Algorith Given k = d s i τ a i (τ 1) b i can write i=1 k = ax(b i ) (τ 1) j ax(a i,j ) j=0 i=1 s i,j τ a i,j Copute kp using ax(b i ) τ-adic expansions Cost: ultiply by (τ 1) : one τ, one point subtraction overall: ax(b i )+d 1 point adds/subs nuber of point additions required is sublinear in N(k) Diitrov et al. (Univ. Calgary) February 28, / 15

18 Algoriths Nuerical Evidence Avg nuber of point adds to copute kp on E a (F 2 ) Blocking τnaf Greedy w =5 w = 10 w = Fewer point adds than τnaf in all cases w =5requires< 1 KB ROM (no points need to be stored) Diitrov et al. (Univ. Calgary) February 28, / 15

19 FPGA ipleentation Preliinaries Coputation of Algoriths Specifications NIST curve K-163 F 2 163, noralbasis Diitrov et al. (Univ. Calgary) February 28, / 15

20 FPGA ipleentation Preliinaries Coputation of Algoriths Specifications NIST curve K-163 F 2 163, noralbasis Coputed one row, i.e. ( j k i,jτ j )(τ 1) i P,atatie Each row is coputed as a τ NAF point ultiplication Point ultiplication algorith Input: k, P Output: Q = kp P 0 P; Q O for i =0toax(b i ) do S r i (k)p i P i+1 τp i P i Q Q + S end for Diitrov et al. (Univ. Calgary) February 28, / 15

21 FPGA ipleentation Preliinaries Coputation of Algoriths Specifications NIST curve K-163 F 2 163, noralbasis Point ultiplication algorith Input: k, P Output: Q = kp P 0 P; Q O for i =0toax(b i ) do S r i (k)p i P i+1 τp i P i Q Q + S end for Coputed one row, i.e. ( j k i,jτ j )(τ 1) i P,atatie Each row is coputed as a τ NAF point ultiplication Point addition in ixed coordinates (LD/A) and Frobenius ap in LD S S ± P i ; S τs Diitrov et al. (Univ. Calgary) February 28, / 15

22 FPGA ipleentation Preliinaries Coputation of Algoriths Specifications NIST curve K-163 F 2 163, noralbasis Point ultiplication algorith Input: k, P Output: Q = kp P 0 P; Q O for i =0toax(b i ) do S r i (k)p i P i+1 τp i P i Q Q + S end for Coputed one row, i.e. ( j k i,jτ j )(τ 1) i P,atatie Each row is coputed as a τ NAF point ultiplication Point addition in ixed coordinates (LD/A) and Frobenius ap in LD S S ± P i ; S τs Frobenius ap and point subtraction in A P i+1 τp i P i Diitrov et al. (Univ. Calgary) February 28, / 15

23 FPGA ipleentation Preliinaries Coputation of Algoriths Specifications NIST curve K-163 F 2 163, noralbasis Point ultiplication algorith Input: k, P Output: Q = kp P 0 P; Q O for i =0toax(b i ) do S r i (k)p i P i+1 τp i P i Q Q + S end for Coputed one row, i.e. ( j k i,jτ j )(τ 1) i P,atatie Each row is coputed as a τ NAF point ultiplication Point addition in ixed coordinates (LD/A) and Frobenius ap in LD S S ± P i ; S τs Frobenius ap and point subtraction in A P i+1 τp i P i Point addition in LD Q Q + S Diitrov et al. (Univ. Calgary) February 28, / 15

24 FPGA ipleentation Preliinaries Coputation of Algoriths Specifications NIST curve K-163 F 2 163, noralbasis Point ultiplication algorith Input: k, P Output: Q = kp P 0 P; Q O for i =0toax(b i ) do S r i (k)p i P i+1 τp i P i Q Q + S end for Coputed one row, i.e. ( j k i,jτ j )(τ 1) i P,atatie Each row is coputed as a τ NAF point ultiplication Point addition in ixed coordinates (LD/A) and Frobenius ap in LD S S ± P i ; S τs Frobenius ap and point subtraction in A P i+1 τp i P i Point addition in LD Q Q + S LD A apping Diitrov et al. (Univ. Calgary) February 28, / 15

25 FPGA ipleentation Architecture Field arithetic processor (FAP) DATA IN Storage RAM DATA OUT 512 -bit dual-port Adder Multiplier Squarer ADDRA ADDRB 9 9 RAM OPER 4 Control logic SHIFT 6 Diitrov et al. (Univ. Calgary) February 28, / 15

26 FPGA ipleentation Architecture Field arithetic processor (FAP) DATA IN Storage RAM DATA OUT 512 -bit dual-port Adder Multiplier Squarer ADDRA ADDRB 9 9 RAM OPER 4 Control logic SHIFT 6 Multiplier Digit-serial Massey-Oura ultiplier Latency: 9 clock cycles Diitrov et al. (Univ. Calgary) February 28, / 15

27 FPGA ipleentation Architecture Field arithetic processor (FAP) DATA IN Storage RAM DATA OUT 512 -bit dual-port Adder Multiplier Squarer ADDRA ADDRB 9 9 RAM OPER 4 Control logic SHIFT 6 Adder and squarer Adder: bitwise exclusive-or (xor) Squarer: shifter (ax shift 2 6 1) Diitrov et al. (Univ. Calgary) February 28, / 15

28 FPGA ipleentation Architecture Field arithetic processor (FAP) DATA IN Storage RAM DATA OUT 512 -bit dual-port Adder Multiplier Squarer ADDRA ADDRB 9 9 RAM OPER 4 Control logic SHIFT 6 Storage RAM Dual-port RAM ipleented in BlockRAMs 5 BlockRAMs needed (One B-RAM: bits) Diitrov et al. (Univ. Calgary) February 28, / 15

29 FPGA ipleentation Architecture Syste architecture {τ,τ 1}-converter Converts k into {τ,τ 1}-expansion Partial reduction (Solinas, 2000), coputation of τ-adic expansion and blocking algorith (w = 10) Control logic and FAP FAP controlled by hand-optiized control sequences stored in a ROM (BlockRAM) k parsed and the ROM controlled by an FSM Converter and the rest of the design use different clocks Latency of a point ultiplication (excluding conversion): L kp = 104 d ax(b i ) + 84 Diitrov et al. (Univ. Calgary) February 28, / 15

30 FPGA ipleentation Results Results Xilinx Virtex-II XC2V Maxiu clock frequency: 128 MHz Resource requireents: 6,494 slices and 6 BlockRAMs Converter: 88 MHz, 2,251 slices, 2 BlockRAMs and 2 ultipliers One conversion requires 3.81 µs ax(b i ) d LD/A A LD L kp Tie (µs) Diitrov et al. (Univ. Calgary) February 28, / 15

31 Future Work Future work Copare with ASIACRYPT 2006 (Avanzi, Diitrov, Doche, Sica): proof of sublinear density for 2 coplex bases eory-free conversion algorith: Window ethod analogues (fixed base point): two-diensional windows? Analogue for hyperelliptic curves? Ipleentation iproveents: Coputing rows in parallel leads to shorter latency Polynoial basis ipleentation Diitrov et al. (Univ. Calgary) February 28, / 15

FPGA Implementation of Point Multiplication on Koblitz Curves Using Kleinian Integers

FPGA Implementation of Point Multiplication on Koblitz Curves Using Kleinian Integers FPGA Implementation of Point Multiplication on Koblitz Curves Using Kleinian Integers V.S. Dimitrov 1, K.U. Järvinen 2, M.J. Jacobson, Jr. 3, W.F. Chan 3, and Z. Huang 1 1 Department of Electrical and

More information

Scalar Multiplication on Koblitz Curves using

Scalar Multiplication on Koblitz Curves using Scalar Multiplication on Koblitz Curves using τ 2 NAF Sujoy Sinha Roy 1, Chester Rebeiro 1, Debdeep Mukhopadhyay 1, Junko Takahashi 2 and Toshinori Fukunaga 3 1 Dept. of Computer Science and Engineering

More information

ABHELSINKI UNIVERSITY OF TECHNOLOGY

ABHELSINKI UNIVERSITY OF TECHNOLOGY On Repeated Squarings in Binary Fields Kimmo Järvinen Helsinki University of Technology August 14, 2009 K. Järvinen On Repeated Squarings in Binary Fields 1/1 Introduction Repeated squaring Repeated squaring:

More information

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials Fast Montgoery-like Square Root Coputation over GF( ) for All Trinoials Yin Li a, Yu Zhang a, a Departent of Coputer Science and Technology, Xinyang Noral University, Henan, P.R.China Abstract This letter

More information

Low complexity bit parallel multiplier for GF(2 m ) generated by equally-spaced trinomials

Low complexity bit parallel multiplier for GF(2 m ) generated by equally-spaced trinomials Inforation Processing Letters 107 008 11 15 www.elsevier.co/locate/ipl Low coplexity bit parallel ultiplier for GF generated by equally-spaced trinoials Haibin Shen a,, Yier Jin a,b a Institute of VLSI

More information

Curious Bounds for Floor Function Sums

Curious Bounds for Floor Function Sums 1 47 6 11 Journal of Integer Sequences, Vol. 1 (018), Article 18.1.8 Curious Bounds for Floor Function Sus Thotsaporn Thanatipanonda and Elaine Wong 1 Science Division Mahidol University International

More information

Elliptic Curve Scalar Point Multiplication Algorithm Using Radix-4 Booth s Algorithm

Elliptic Curve Scalar Point Multiplication Algorithm Using Radix-4 Booth s Algorithm Elliptic Curve Scalar Multiplication Algorith Using Radix-4 Booth s Algorith Elliptic Curve Scalar Multiplication Algorith Using Radix-4 Booth s Algorith Sangook Moon, Non-eber ABSTRACT The ain back-bone

More information

Exponentiation and Point Multiplication. Çetin Kaya Koç Spring / 70

Exponentiation and Point Multiplication.   Çetin Kaya Koç Spring / 70 Exponentiation and Point Multiplication 1 2 3 4 5 6 8 7 10 9 12 16 14 11 13 15 20 http://koclab.org Çetin Kaya Koç Spring 2018 1 / 70 Contents Exponentiation and Point Multiplication Exponentiation and

More information

Parallel Formulations of Scalar Multiplication on Koblitz Curves

Parallel Formulations of Scalar Multiplication on Koblitz Curves Journal of Universal Computer Science, vol. 14, no. 3 (008), 481-504 submitted: /6/07, accepted: 1/11/07, appeared: 1//08 J.UCS Parallel Formulations of Scalar Multiplication on Koblitz Curves Omran Ahmadi

More information

Lecture 21. Interior Point Methods Setup and Algorithm

Lecture 21. Interior Point Methods Setup and Algorithm Lecture 21 Interior Point Methods In 1984, Kararkar introduced a new weakly polynoial tie algorith for solving LPs [Kar84a], [Kar84b]. His algorith was theoretically faster than the ellipsoid ethod and

More information

Software implementation of Koblitz curves over quadratic fields

Software implementation of Koblitz curves over quadratic fields Software implementation of Koblitz curves over quadratic fields Thomaz Oliveira 1, Julio López 2 and Francisco Rodríguez-Henríquez 1 1 Computer Science Department, Cinvestav-IPN 2 Institute of Computing,

More information

A Division Algorithm Using Bisection Method in Residue Number System

A Division Algorithm Using Bisection Method in Residue Number System International Journal of Coputer, Consuer and Control IJ3C), Vol., No. 03) 59 A Division Algorith Using Bisection Method in Residue Nuber Syste * Chin-Chen Chang and Jen-Ho Yang Abstract. Introduction

More information

A note on the multiplication of sparse matrices

A note on the multiplication of sparse matrices Cent. Eur. J. Cop. Sci. 41) 2014 1-11 DOI: 10.2478/s13537-014-0201-x Central European Journal of Coputer Science A note on the ultiplication of sparse atrices Research Article Keivan Borna 12, Sohrab Aboozarkhani

More information

Feature Extraction Techniques

Feature Extraction Techniques Feature Extraction Techniques Unsupervised Learning II Feature Extraction Unsupervised ethods can also be used to find features which can be useful for categorization. There are unsupervised ethods that

More information

Efficient Filter Banks And Interpolators

Efficient Filter Banks And Interpolators Efficient Filter Banks And Interpolators A. G. DEMPSTER AND N. P. MURPHY Departent of Electronic Systes University of Westinster 115 New Cavendish St, London W1M 8JS United Kingdo Abstract: - Graphical

More information

Finite fields. and we ve used it in various examples and homework problems. In these notes I will introduce more finite fields

Finite fields. and we ve used it in various examples and homework problems. In these notes I will introduce more finite fields Finite fields I talked in class about the field with two eleents F 2 = {, } and we ve used it in various eaples and hoework probles. In these notes I will introduce ore finite fields F p = {,,...,p } for

More information

s = (Y Q Y P)/(X Q - X P)

s = (Y Q Y P)/(X Q - X P) Elliptic Curves and their Applications in Cryptography Preeti Shara M.Tech Student Mody University of Science and Technology, Lakshangarh Abstract This paper gives an introduction to elliptic curves. The

More information

Intelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines

Intelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines Intelligent Systes: Reasoning and Recognition Jaes L. Crowley osig 1 Winter Seester 2018 Lesson 6 27 February 2018 Outline Perceptrons and Support Vector achines Notation...2 Linear odels...3 Lines, Planes

More information

Faster Scalar Multiplication on Koblitz Curves combining Point Halving with the Frobenius Endomorphism

Faster Scalar Multiplication on Koblitz Curves combining Point Halving with the Frobenius Endomorphism Faster Scalar Multiplication on Koblitz Curves combining Point Halving with the Frobenius Endomorphism Roberto Maria Avanzi 1, Mathieu Ciet 2, and Francesco Sica 3 1 IEM, University of Duisburg-Essen,

More information

Arithmetic Unit for Complex Number Processing

Arithmetic Unit for Complex Number Processing Abstract Arithetic Unit or Coplex Nuber Processing Dr. Soloon Khelnik, Dr. Sergey Selyutin, Alexandr Viduetsky, Inna Doubson, Seion Khelnik This paper presents developent o a coplex nuber arithetic unit

More information

ALGEBRA REVIEW. MULTINOMIAL An algebraic expression consisting of more than one term.

ALGEBRA REVIEW. MULTINOMIAL An algebraic expression consisting of more than one term. Page 1 of 6 ALGEBRAIC EXPRESSION A cobination of ordinary nubers, letter sybols, variables, grouping sybols and operation sybols. Nubers reain fixed in value and are referred to as constants. Letter sybols

More information

Kernel Methods and Support Vector Machines

Kernel Methods and Support Vector Machines Intelligent Systes: Reasoning and Recognition Jaes L. Crowley ENSIAG 2 / osig 1 Second Seester 2012/2013 Lesson 20 2 ay 2013 Kernel ethods and Support Vector achines Contents Kernel Functions...2 Quadratic

More information

Polygonal Designs: Existence and Construction

Polygonal Designs: Existence and Construction Polygonal Designs: Existence and Construction John Hegean Departent of Matheatics, Stanford University, Stanford, CA 9405 Jeff Langford Departent of Matheatics, Drake University, Des Moines, IA 5011 G

More information

DTTF/NB479: Dszquphsbqiz Day 27

DTTF/NB479: Dszquphsbqiz Day 27 DTTF/NB479: Dszquphsbqiz Day 27 Announceents: Questions? This week: Discrete Logs, Diffie-Hellan, ElGaal Hash Functions and SHA-1 Birthday attacks Hash Functions Message (long) Cryptographic hash Function,

More information

On the Optimal Pre-Computation of Window τ NAF for Koblitz Curves

On the Optimal Pre-Computation of Window τ NAF for Koblitz Curves On the Optimal Pre-Computation of Window τ NAF for Koblitz Curves William R. Trost and Guangwu Xu Abstract Koblitz curves have been a nice subject of consideration for both theoretical and practical interests.

More information

The Simplex Method is Strongly Polynomial for the Markov Decision Problem with a Fixed Discount Rate

The Simplex Method is Strongly Polynomial for the Markov Decision Problem with a Fixed Discount Rate The Siplex Method is Strongly Polynoial for the Markov Decision Proble with a Fixed Discount Rate Yinyu Ye April 20, 2010 Abstract In this note we prove that the classic siplex ethod with the ost-negativereduced-cost

More information

Efficient Arithmetic on Koblitz Curves*

Efficient Arithmetic on Koblitz Curves* Designs, Codes and Cryptography, 19, 195 249 (2000) c 2000 Kluwer Academic Publishers, Boston. Manufactured in The Netherlands. Efficient Arithmetic on Koblitz Curves* JEROME A. SOLINAS National Security

More information

On Concurrent Detection of Errors in Polynomial Basis Multiplication

On Concurrent Detection of Errors in Polynomial Basis Multiplication 1 On Concurrent Detection of Errors in Polynoial Basis Multiplication Siavash Bayat-Saradi and M. Anwar Hasan Abstract The detection of errors in arithetic operations is an iportant issue. This paper discusses

More information

List Scheduling and LPT Oliver Braun (09/05/2017)

List Scheduling and LPT Oliver Braun (09/05/2017) List Scheduling and LPT Oliver Braun (09/05/207) We investigate the classical scheduling proble P ax where a set of n independent jobs has to be processed on 2 parallel and identical processors (achines)

More information

A New Algorithm for Reactive Electric Power Measurement

A New Algorithm for Reactive Electric Power Measurement A. Abiyev, GAU J. Soc. & Appl. Sci., 2(4), 7-25, 27 A ew Algorith for Reactive Electric Power Measureent Adalet Abiyev Girne Aerican University, Departernt of Electrical Electronics Engineering, Mersin,

More information

N-Point. DFTs of Two Length-N Real Sequences

N-Point. DFTs of Two Length-N Real Sequences Coputation of the DFT of In ost practical applications, sequences of interest are real In such cases, the syetry properties of the DFT given in Table 5. can be exploited to ake the DFT coputations ore

More information

BINARY extension fields GF (2 m ) are heavily used

BINARY extension fields GF (2 m ) are heavily used This article has been accepte for publication in a future issue of this journal, but has not been fully eite. Content ay change prior to final publication. Citation inforation: DOI 0.09/TC.205.248408,

More information

Optimizing scalar multiplication for koblitz curves using hybrid FPGAs

Optimizing scalar multiplication for koblitz curves using hybrid FPGAs Rochester Institute of Technology RIT Scholar Works Theses Thesis/Dissertation Collections 6-1-2009 Optimizing scalar multiplication for koblitz curves using hybrid FPGAs Gregory Głuszek Follow this and

More information

Arithmetic Operators for Pairing-Based Cryptography

Arithmetic Operators for Pairing-Based Cryptography Arithmetic Operators for Pairing-Based Cryptography J.-L. Beuchat 1 N. Brisebarre 2 J. Detrey 3 E. Okamoto 1 1 University of Tsukuba, Japan 2 École Normale Supérieure de Lyon, France 3 Cosec, b-it, Bonn,

More information

Parallel stream cipher for secure high-speed communications

Parallel stream cipher for secure high-speed communications Signal Processing 82 (2002 259 265 www.elsevier.co/locate/sigpro Parallel strea cipher for secure high-speed counications Hoonjae Lee a;, Sangjae Moon b a Departent of Coputer Engineering, Kyungwoon University,

More information

Minimality of the Hamming Weight of the τ -NAF for Koblitz Curves and Improved Combination with Point Halving

Minimality of the Hamming Weight of the τ -NAF for Koblitz Curves and Improved Combination with Point Halving Minimality of the Hamming Weight of the τ -NAF for Koblitz Curves and Improved Combination with Point Halving Roberto Maria Avanzi 1 Clemens Heuberger 2 and Helmut Prodinger 1 Faculty of Mathematics and

More information

Uniform Approximation and Bernstein Polynomials with Coefficients in the Unit Interval

Uniform Approximation and Bernstein Polynomials with Coefficients in the Unit Interval Unifor Approxiation and Bernstein Polynoials with Coefficients in the Unit Interval Weiang Qian and Marc D. Riedel Electrical and Coputer Engineering, University of Minnesota 200 Union St. S.E. Minneapolis,

More information

Lecture 13 Eigenvalue Problems

Lecture 13 Eigenvalue Problems Lecture 13 Eigenvalue Probles MIT 18.335J / 6.337J Introduction to Nuerical Methods Per-Olof Persson October 24, 2006 1 The Eigenvalue Decoposition Eigenvalue proble for atrix A: Ax = λx with eigenvalues

More information

An Attack Bound for Small Multiplicative Inverse of ϕ(n) mod e with a Composed Prime Sum p + q Using Sublattice Based Techniques

An Attack Bound for Small Multiplicative Inverse of ϕ(n) mod e with a Composed Prime Sum p + q Using Sublattice Based Techniques Article An Attack Bound for Sall Multiplicative Inverse of ϕn) od e with a Coposed Prie Su p + q Using Sublattice Based Techniques Pratha Anuradha Kaeswari * and Labadi Jyotsna Departent of Matheatics,

More information

1 Proof of learning bounds

1 Proof of learning bounds COS 511: Theoretical Machine Learning Lecturer: Rob Schapire Lecture #4 Scribe: Akshay Mittal February 13, 2013 1 Proof of learning bounds For intuition of the following theore, suppose there exists a

More information

Extended Double-Base Number System with Applications to Elliptic Curve Cryptography

Extended Double-Base Number System with Applications to Elliptic Curve Cryptography Extended Double-Base Number System with Applications to Elliptic Curve Cryptography Christophe Doche, Laurent Imbert To cite this version: Christophe Doche, Laurent Imbert. Extended Double-Base Number

More information

A Generalized Permanent Estimator and its Application in Computing Multi- Homogeneous Bézout Number

A Generalized Permanent Estimator and its Application in Computing Multi- Homogeneous Bézout Number Research Journal of Applied Sciences, Engineering and Technology 4(23): 5206-52, 202 ISSN: 2040-7467 Maxwell Scientific Organization, 202 Subitted: April 25, 202 Accepted: May 3, 202 Published: Deceber

More information

Arithmetic operators for pairing-based cryptography

Arithmetic operators for pairing-based cryptography 7. Kryptotag November 9 th, 2007 Arithmetic operators for pairing-based cryptography Jérémie Detrey Cosec, B-IT, Bonn, Germany jdetrey@bit.uni-bonn.de Joint work with: Jean-Luc Beuchat Nicolas Brisebarre

More information

Singularities of divisors on abelian varieties

Singularities of divisors on abelian varieties Singularities of divisors on abelian varieties Olivier Debarre March 20, 2006 This is joint work with Christopher Hacon. We work over the coplex nubers. Let D be an effective divisor on an abelian variety

More information

Sharp Time Data Tradeoffs for Linear Inverse Problems

Sharp Time Data Tradeoffs for Linear Inverse Problems Sharp Tie Data Tradeoffs for Linear Inverse Probles Saet Oyak Benjain Recht Mahdi Soltanolkotabi January 016 Abstract In this paper we characterize sharp tie-data tradeoffs for optiization probles used

More information

arxiv: v1 [math.nt] 14 Sep 2014

arxiv: v1 [math.nt] 14 Sep 2014 ROTATION REMAINDERS P. JAMESON GRABER, WASHINGTON AND LEE UNIVERSITY 08 arxiv:1409.411v1 [ath.nt] 14 Sep 014 Abstract. We study properties of an array of nubers, called the triangle, in which each row

More information

a a a a a a a m a b a b

a a a a a a a m a b a b Algebra / Trig Final Exa Study Guide (Fall Seester) Moncada/Dunphy Inforation About the Final Exa The final exa is cuulative, covering Appendix A (A.1-A.5) and Chapter 1. All probles will be ultiple choice

More information

Hardware Acceleration of the Tate Pairing in Characteristic Three

Hardware Acceleration of the Tate Pairing in Characteristic Three Hardware Acceleration of the Tate Pairing in Characteristic Three CHES 2005 Hardware Acceleration of the Tate Pairing in Characteristic Three Slide 1 Introduction Pairing based cryptography is a (fairly)

More information

Arithmetic Operators for Pairing-Based Cryptography

Arithmetic Operators for Pairing-Based Cryptography Arithmetic Operators for Pairing-Based Cryptography Jean-Luc Beuchat Laboratory of Cryptography and Information Security Graduate School of Systems and Information Engineering University of Tsukuba 1-1-1

More information

Complexity reduction in low-delay Farrowstructure-based. filters utilizing linear-phase subfilters

Complexity reduction in low-delay Farrowstructure-based. filters utilizing linear-phase subfilters Coplexity reduction in low-delay Farrowstructure-based variable fractional delay FIR filters utilizing linear-phase subfilters Air Eghbali and Håkan Johansson Linköping University Post Print N.B.: When

More information

Block designs and statistics

Block designs and statistics Bloc designs and statistics Notes for Math 447 May 3, 2011 The ain paraeters of a bloc design are nuber of varieties v, bloc size, nuber of blocs b. A design is built on a set of v eleents. Each eleent

More information

Egyptian Mathematics Problem Set

Egyptian Mathematics Problem Set (Send corrections to cbruni@uwaterloo.ca) Egyptian Matheatics Proble Set (i) Use the Egyptian area of a circle A = (8d/9) 2 to copute the areas of the following circles with given diaeter. d = 2. d = 3

More information

FPGA accelerated multipliers over binary composite fields constructed via low hamming weight irreducible polynomials

FPGA accelerated multipliers over binary composite fields constructed via low hamming weight irreducible polynomials FPGA accelerated multipliers over binary composite fields constructed via low hamming weight irreducible polynomials C. Shu, S. Kwon and K. Gaj Abstract: The efficient design of digit-serial multipliers

More information

Speeding Up the Fixed-Base Comb Method for Faster Scalar Multiplication on Koblitz Curves

Speeding Up the Fixed-Base Comb Method for Faster Scalar Multiplication on Koblitz Curves Speeding Up the Fixed-Base Comb Method for Faster Scalar Multiplication on Koblitz Curves Christian Hanser and Christian Wagner Institute for Applied Information Processing and Communications (IAIK), Graz

More information

On the Design of an On-line Complex Householder Transform

On the Design of an On-line Complex Householder Transform On the esign of an On-line Coplex Householder Transfor Robert McIlhenny Coputer Science epartent California State University, Northridge Northridge, CA 9330 rcilhen@csunedu Milo s Ercegovac Coputer Science

More information

Fast point multiplication algorithms for binary elliptic curves with and without precomputation

Fast point multiplication algorithms for binary elliptic curves with and without precomputation Fast point multiplication algorithms for binary elliptic curves with and without precomputation Thomaz Oliveira 1 Diego F. Aranha 2 Julio López 2 Francisco Rodríguez-Henríquez 1 1 CINVESTAV-IPN, Mexico

More information

Hardware Architectures of Elliptic Curve Based Cryptosystems over Binary Fields

Hardware Architectures of Elliptic Curve Based Cryptosystems over Binary Fields Hardware Architectures of Elliptic Curve Based Cryptosystems over Binary Fields Chang Shu Doctoral Dissertation Defense Feb. 8, 007 Advisor: Dr. Kris Gaj Dept. of Electrical & Computer Engineering George

More information

Algorithms for parallel processor scheduling with distinct due windows and unit-time jobs

Algorithms for parallel processor scheduling with distinct due windows and unit-time jobs BULLETIN OF THE POLISH ACADEMY OF SCIENCES TECHNICAL SCIENCES Vol. 57, No. 3, 2009 Algoriths for parallel processor scheduling with distinct due windows and unit-tie obs A. JANIAK 1, W.A. JANIAK 2, and

More information

On the Communication Complexity of Lipschitzian Optimization for the Coordinated Model of Computation

On the Communication Complexity of Lipschitzian Optimization for the Coordinated Model of Computation journal of coplexity 6, 459473 (2000) doi:0.006jco.2000.0544, available online at http:www.idealibrary.co on On the Counication Coplexity of Lipschitzian Optiization for the Coordinated Model of Coputation

More information

High-speed VLSI implementation of Digit-serial Gaussian normal basis Multiplication over GF(2 m )

High-speed VLSI implementation of Digit-serial Gaussian normal basis Multiplication over GF(2 m ) High-speed VLSI ipleentation of igit-serial Gaussian noral basis Multiplication over GF(2 ) Bahra Rashidi, Sayed Masoud Sayedi 2, Reza Rezaeian Farashahi 3,2 ept. of Elec. & Cop. Eng., Isfahan University

More information

A New Bit-Serial Architecture for Field Multiplication Using Polynomial Bases

A New Bit-Serial Architecture for Field Multiplication Using Polynomial Bases A New Bit-Serial Architecture for Field Multiplication Using Polynomial Bases Arash Reyhani-Masoleh Department of Electrical and Computer Engineering The University of Western Ontario London, Ontario,

More information

EECS150 - Digital Design Lecture 23 - FFs revisited, FIFOs, ECCs, LSFRs. Cross-coupled NOR gates

EECS150 - Digital Design Lecture 23 - FFs revisited, FIFOs, ECCs, LSFRs. Cross-coupled NOR gates EECS150 - Digital Design Lecture 23 - FFs revisited, FIFOs, ECCs, LSFRs April 16, 2009 John Wawrzynek Spring 2009 EECS150 - Lec24-blocks Page 1 Cross-coupled NOR gates remember, If both R=0 & S=0, then

More information

Reduced-Area Constant-Coefficient and Multiple-Constant Multipliers for Xilinx FPGAs with 6-Input LUTs

Reduced-Area Constant-Coefficient and Multiple-Constant Multipliers for Xilinx FPGAs with 6-Input LUTs Article Reduced-Area Constant-Coefficient and Multiple-Constant Multipliers for Xilinx FPGAs with 6-Input LUTs E. George Walters III Department of Electrical and Computer Engineering, Penn State Erie,

More information

Introduction to Discrete Optimization

Introduction to Discrete Optimization Prof. Friedrich Eisenbrand Martin Nieeier Due Date: March 9 9 Discussions: March 9 Introduction to Discrete Optiization Spring 9 s Exercise Consider a school district with I neighborhoods J schools and

More information

Bipartite subgraphs and the smallest eigenvalue

Bipartite subgraphs and the smallest eigenvalue Bipartite subgraphs and the sallest eigenvalue Noga Alon Benny Sudaov Abstract Two results dealing with the relation between the sallest eigenvalue of a graph and its bipartite subgraphs are obtained.

More information

On Constant Power Water-filling

On Constant Power Water-filling On Constant Power Water-filling Wei Yu and John M. Cioffi Electrical Engineering Departent Stanford University, Stanford, CA94305, U.S.A. eails: {weiyu,cioffi}@stanford.edu Abstract This paper derives

More information

Generalized AOR Method for Solving System of Linear Equations. Davod Khojasteh Salkuyeh. Department of Mathematics, University of Mohaghegh Ardabili,

Generalized AOR Method for Solving System of Linear Equations. Davod Khojasteh Salkuyeh. Department of Mathematics, University of Mohaghegh Ardabili, Australian Journal of Basic and Applied Sciences, 5(3): 35-358, 20 ISSN 99-878 Generalized AOR Method for Solving Syste of Linear Equations Davod Khojasteh Salkuyeh Departent of Matheatics, University

More information

Small FPGA-Based Multiplication-Inversion Unit for Normal Basis over GF(2 m )

Small FPGA-Based Multiplication-Inversion Unit for Normal Basis over GF(2 m ) 1 / 19 Small FPGA-Based Multiplication-Inversion Unit for Normal Basis over GF(2 m ) Métairie Jérémy, Tisserand Arnaud and Casseau Emmanuel CAIRN - IRISA July 9 th, 2015 ISVLSI 2015 PAVOIS ANR 12 BS02

More information

Hardware Implementation of Elliptic Curve Point Multiplication over GF (2 m ) for ECC protocols

Hardware Implementation of Elliptic Curve Point Multiplication over GF (2 m ) for ECC protocols Hardware Implementation of Elliptic Curve Point Multiplication over GF (2 m ) for ECC protocols Moncef Amara University of Paris 8 LAGA laboratory Saint-Denis / France Amar Siad University of Paris 8 LAGA

More information

Linear recurrences and asymptotic behavior of exponential sums of symmetric boolean functions

Linear recurrences and asymptotic behavior of exponential sums of symmetric boolean functions Linear recurrences and asyptotic behavior of exponential sus of syetric boolean functions Francis N. Castro Departent of Matheatics University of Puerto Rico, San Juan, PR 00931 francis.castro@upr.edu

More information

Characterization of the Line Complexity of Cellular Automata Generated by Polynomial Transition Rules. Bertrand Stone

Characterization of the Line Complexity of Cellular Automata Generated by Polynomial Transition Rules. Bertrand Stone Characterization of the Line Coplexity of Cellular Autoata Generated by Polynoial Transition Rules Bertrand Stone Abstract Cellular autoata are discrete dynaical systes which consist of changing patterns

More information

Ch 12: Variations on Backpropagation

Ch 12: Variations on Backpropagation Ch 2: Variations on Backpropagation The basic backpropagation algorith is too slow for ost practical applications. It ay take days or weeks of coputer tie. We deonstrate why the backpropagation algorith

More information

e-companion ONLY AVAILABLE IN ELECTRONIC FORM

e-companion ONLY AVAILABLE IN ELECTRONIC FORM OPERATIONS RESEARCH doi 10.1287/opre.1070.0427ec pp. ec1 ec5 e-copanion ONLY AVAILABLE IN ELECTRONIC FORM infors 07 INFORMS Electronic Copanion A Learning Approach for Interactive Marketing to a Custoer

More information

SCALAR MULTIPLICATION ON KOBLITZ CURVES USING THE FROBENIUS ENDOMORPHISM AND ITS COMBINATION WITH POINT HALVING: EXTENSIONS AND MATHEMATICAL ANALYSIS

SCALAR MULTIPLICATION ON KOBLITZ CURVES USING THE FROBENIUS ENDOMORPHISM AND ITS COMBINATION WITH POINT HALVING: EXTENSIONS AND MATHEMATICAL ANALYSIS SCALAR MULTIPLICATION ON KOBLITZ CURVES USING THE FROBENIUS ENDOMORPHISM AND ITS COMBINATION WITH POINT HALVING: EXTENSIONS AND MATHEMATICAL ANALYSIS ROBERTO M. AVANZI, CLEMENS HEUBERGER, AND HELMUT PRODINGER

More information

(t, m, s)-nets and Maximized Minimum Distance, Part II

(t, m, s)-nets and Maximized Minimum Distance, Part II (t,, s)-nets and Maxiized Miniu Distance, Part II Leonhard Grünschloß and Alexander Keller Abstract The quality paraeter t of (t,, s)-nets controls extensive stratification properties of the generated

More information

time time δ jobs jobs

time time δ jobs jobs Approxiating Total Flow Tie on Parallel Machines Stefano Leonardi Danny Raz y Abstract We consider the proble of optiizing the total ow tie of a strea of jobs that are released over tie in a ultiprocessor

More information

Bus transit = 20 ns (one way) access, each module cannot be accessed faster than 120 ns. So, the maximum bandwidth is

Bus transit = 20 ns (one way) access, each module cannot be accessed faster than 120 ns. So, the maximum bandwidth is 32 Flynn: Coputer Architecture { The Solutions Chapter 6. Meory Syste Design Proble 6. The eory odule uses 64 4 M b chips for 32MB of data and 8 4 M b chips for ECC. This allows 64 bits + 8 bits ECC to

More information

Model Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon

Model Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon Model Fitting CURM Background Material, Fall 014 Dr. Doreen De Leon 1 Introduction Given a set of data points, we often want to fit a selected odel or type to the data (e.g., we suspect an exponential

More information

NBN Algorithm Introduction Computational Fundamentals. Bogdan M. Wilamoswki Auburn University. Hao Yu Auburn University

NBN Algorithm Introduction Computational Fundamentals. Bogdan M. Wilamoswki Auburn University. Hao Yu Auburn University NBN Algorith Bogdan M. Wilaoswki Auburn University Hao Yu Auburn University Nicholas Cotton Auburn University. Introduction. -. Coputational Fundaentals - Definition of Basic Concepts in Neural Network

More information

Fast Multiple Point Multiplication on Elliptic Curves over Prime and Binary Fields using the Double-Base Number System

Fast Multiple Point Multiplication on Elliptic Curves over Prime and Binary Fields using the Double-Base Number System Fast Multiple Point Multiplication on Elliptic Curves over Prime and Binary Fields using the Double-Base Number System Jithra Adikari, Vassil S. Dimitrov, and Pradeep Mishra Department of Electrical and

More information

Fast Scalar Multiplication on Elliptic Curves fo Sensor Nodes

Fast Scalar Multiplication on Elliptic Curves fo Sensor Nodes Réseaux Grand Est Fast Scalar Multiplication on Elliptic Curves fo Sensor Nodes Youssou FAYE Hervé GUYENNET Yanbo SHOU Université de Franche-Comté Besançon le 24 octobre 2013 TABLE OF CONTENTS ❶ Introduction

More information

Understanding Machine Learning Solution Manual

Understanding Machine Learning Solution Manual Understanding Machine Learning Solution Manual Written by Alon Gonen Edited by Dana Rubinstein Noveber 17, 2014 2 Gentle Start 1. Given S = ((x i, y i )), define the ultivariate polynoial p S (x) = i []:y

More information

RESTARTED FULL ORTHOGONALIZATION METHOD FOR SHIFTED LINEAR SYSTEMS

RESTARTED FULL ORTHOGONALIZATION METHOD FOR SHIFTED LINEAR SYSTEMS BIT Nuerical Matheatics 43: 459 466, 2003. 2003 Kluwer Acadeic Publishers. Printed in The Netherlands 459 RESTARTED FULL ORTHOGONALIZATION METHOD FOR SHIFTED LINEAR SYSTEMS V. SIMONCINI Dipartiento di

More information

Combinatorial Primality Test

Combinatorial Primality Test Cobinatorial Priality Test Maheswara Rao Valluri School of Matheatical and Coputing Sciences Fiji National University, Derrick Capus, Suva, Fiji E-ail: aheswara.valluri@fnu.ac.fj Abstract This paper provides

More information

Lecture 21 Principle of Inclusion and Exclusion

Lecture 21 Principle of Inclusion and Exclusion Lecture 21 Principle of Inclusion and Exclusion Holden Lee and Yoni Miller 5/6/11 1 Introduction and first exaples We start off with an exaple Exaple 11: At Sunnydale High School there are 28 students

More information

Support Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization

Support Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization Recent Researches in Coputer Science Support Vector Machine Classification of Uncertain and Ibalanced data using Robust Optiization RAGHAV PAT, THEODORE B. TRAFALIS, KASH BARKER School of Industrial Engineering

More information

Fast Scalar Multiplication for Elliptic Curves over Binary Fields by Efficiently Computable Formulas

Fast Scalar Multiplication for Elliptic Curves over Binary Fields by Efficiently Computable Formulas Fast Scalar Multiplication for Elliptic Curves over Binary Fields by Efficiently Computable Formulas Saud Al Musa and Guangwu Xu Department of EE & CS, University of Wisconsin-Milwaukee, USA, {salmusa,gxu4uwm}@uwm.edu

More information

A remark on a success rate model for DPA and CPA

A remark on a success rate model for DPA and CPA A reark on a success rate odel for DPA and CPA A. Wieers, BSI Version 0.5 andreas.wieers@bsi.bund.de Septeber 5, 2018 Abstract The success rate is the ost coon evaluation etric for easuring the perforance

More information

Elliptic Curve Cryptography and Security of Embedded Devices

Elliptic Curve Cryptography and Security of Embedded Devices Elliptic Curve Cryptography and Security of Embedded Devices Ph.D. Defense Vincent Verneuil Institut de Mathématiques de Bordeaux Inside Secure June 13th, 2012 V. Verneuil - Elliptic Curve Cryptography

More information

A Simple Architectural Enhancement for Fast and Flexible Elliptic Curve Cryptography over Binary Finite Fields GF(2 m )

A Simple Architectural Enhancement for Fast and Flexible Elliptic Curve Cryptography over Binary Finite Fields GF(2 m ) A Simple Architectural Enhancement for Fast and Flexible Elliptic Curve Cryptography over Binary Finite Fields GF(2 m ) Stefan Tillich, Johann Großschädl Institute for Applied Information Processing and

More information

Another Look at Inversions over Binary Fields

Another Look at Inversions over Binary Fields Another Look at Inversions over Binary Fields Vassil Dimitrov 1 Kimmo Järvinen 2 1 Department of Electrical and Computer Engineering University of Calgary, Canada 2 Department of Information and Computer

More information

A Note on Scheduling Tall/Small Multiprocessor Tasks with Unit Processing Time to Minimize Maximum Tardiness

A Note on Scheduling Tall/Small Multiprocessor Tasks with Unit Processing Time to Minimize Maximum Tardiness A Note on Scheduling Tall/Sall Multiprocessor Tasks with Unit Processing Tie to Miniize Maxiu Tardiness Philippe Baptiste and Baruch Schieber IBM T.J. Watson Research Center P.O. Box 218, Yorktown Heights,

More information

A new type of lower bound for the largest eigenvalue of a symmetric matrix

A new type of lower bound for the largest eigenvalue of a symmetric matrix Linear Algebra and its Applications 47 7 9 9 www.elsevier.co/locate/laa A new type of lower bound for the largest eigenvalue of a syetric atrix Piet Van Mieghe Delft University of Technology, P.O. Box

More information

PAC-Bayes Analysis Of Maximum Entropy Learning

PAC-Bayes Analysis Of Maximum Entropy Learning PAC-Bayes Analysis Of Maxiu Entropy Learning John Shawe-Taylor and David R. Hardoon Centre for Coputational Statistics and Machine Learning Departent of Coputer Science University College London, UK, WC1E

More information

A High-Speed Processor for Digital Sine/Cosine Generation and Angle Rotation*

A High-Speed Processor for Digital Sine/Cosine Generation and Angle Rotation* Copyright IEEE 998: Published the proceedgs of the nd Asiloar Conference on Signals, Systes and Coputers, Nov -4, 998, at Asiloar, California, USA A High-Speed Processor for Digital Se/Cose Generation

More information

Implementation Of Digital Fir Filter Using Improved Table Look Up Scheme For Residue Number System

Implementation Of Digital Fir Filter Using Improved Table Look Up Scheme For Residue Number System Implementation Of Digital Fir Filter Using Improved Table Look Up Scheme For Residue Number System G.Suresh, G.Indira Devi, P.Pavankumar Abstract The use of the improved table look up Residue Number System

More information

Research Article Some Formulae of Products of the Apostol-Bernoulli and Apostol-Euler Polynomials

Research Article Some Formulae of Products of the Apostol-Bernoulli and Apostol-Euler Polynomials Discrete Dynaics in Nature and Society Volue 202, Article ID 927953, pages doi:055/202/927953 Research Article Soe Forulae of Products of the Apostol-Bernoulli and Apostol-Euler Polynoials Yuan He and

More information

The GigaFitter for Fast Track Fitting based on FPGA DSP Arrays

The GigaFitter for Fast Track Fitting based on FPGA DSP Arrays The GigaFitter for Fast Track Fitting based on FPGA DSP Arrays Pierluigi Catastini (Universita di Siena - INFN Pisa) For the SVT Collaboration SVT: A Success for CDF 35µm 33µm resol beam σ = 48µm SVT provides

More information

Topic 5a Introduction to Curve Fitting & Linear Regression

Topic 5a Introduction to Curve Fitting & Linear Regression /7/08 Course Instructor Dr. Rayond C. Rup Oice: A 337 Phone: (95) 747 6958 E ail: rcrup@utep.edu opic 5a Introduction to Curve Fitting & Linear Regression EE 4386/530 Coputational ethods in EE Outline

More information

Elliptic Curve Cryptosystems and Scalar Multiplication

Elliptic Curve Cryptosystems and Scalar Multiplication Annals of the University of Craiova, Mathematics and Computer Science Series Volume 37(1), 2010, Pages 27 34 ISSN: 1223-6934 Elliptic Curve Cryptosystems and Scalar Multiplication Nicolae Constantinescu

More information