Bit-Parallel Word-Serial Multiplier in GF(2 233 ) and Its VLSI Implementation. Dr. M. Ahmadi
|
|
- Gerald Flynn
- 5 years ago
- Views:
Transcription
1 Bt-Parallel Word-Seral Multpler n GF(2 233 ) and Its VLSI Implementaton Supervsors: Student: Dr. Huapeng Wu Dr. M. Ahmad Wenka Tang
2 Contents Introducton to Fnte Feld Research Motvatons Proposed Multplers VLSI Desgn Conclusons References 2
3 Introducton to Fnte Feld Fnte feld A set of fnte number of elements where addton and multplcaton are defned, denoted as GF Eample : GF(2) {,, +, * } * + Multplcaton Addton Eample 2: GF(2 2 ) can be generated by F() 2 ++ where {,} s called a polynomal bass Four elements are: + ( ( ( ( ) ) ) ) 3
4 4 Fnte Feld Multplcaton 2 2 ),...,, ( ),...,, ( m m m m m m b b b b B and a a a a A Let be any two feld elements n GF(2 m ), where }, {, a b 2 ) ( mod ),...,, ( m m j j j m m F b a AB c c c C Then the product Ths s what we want to mplement Eample: GF(2 2 ) s generated by F() 2 ++ Let B A + () () Then () ) ( mod ) ( ) ( ) mod ( ) ( mod ) ( F F F AB C
5 Fnte feld multplers CAB Operand B Bt-parallel fnte feld multpler AND gates: m 2 XOR gates: m 2 - Operand A Product C A, B, C GF(2 5 ) Bt-seral fnte feld multpler Operand B AND gates: m XOR gates: m+ m-bt regsters: 2 Operand A One multplcaton needs m clock cycles A, B, C GF(2 5 ) Product C 5
6 Bt-parallel squarer CA 2 Archtecture Operand A Squarng C Bt-parallel squarer n GF(2 5 ) Gate counts 3 XOR gates 6
7 Research Motvatons Smart card and applcatons Usually a plastc card that contans a securty processor and has many securty related applcatons E-Commerce Personal fnance Health care Campus badges and access Telecommutng and corporate network securty GSM cell phones Lmtatons Low frequency, lmt memory sze Software mplementaton of securty applcaton s slow and nsecure Area constrant 7
8 Smart card and publc key cryptosystem Publc key cryptosystem key echange, dgtal sgnature and encrypton/decrypton Ellptc Curve (EC) over RSA Shorter key length than RSA wth the same securty strength Very sutable for VLSI mplementaton EC s more sutable for smart card EC operatons Fnte feld multplcaton Fnte feld squarng Fnte feld addton We wll desgn a fnte feld multpler for smart card 8
9 Proposed Multplers Choose a fnte feld Degree Polynomal F( ) F ( ) F( ) F( ) F( ) Fnte felds recommended by NIST for ellptc curve systems 9
10 Bt-Parallel Word-Seral (BPWS) Multpler Let {,, 2,, 232 } be the polynomal bass for GF(2 233 ). Let A and B be any two feld elements and A 232 a, where a GF ( 2 ) B 232 b, where b GF ( 2 ) The product s C AB 232 a mod B F ( ) mod F ( )
11 Bt-Parallel Word-Seral (BPWS) Multpler (Cont d) Algorthm: A ( a A 29 a a a7a6... a A A 28 ) Archtecture: 7 6 Let A a + a + + a, for,,..., 29 j + 8 j+ 7 8 j j j Then A 232 a (...( A29 + A28 ) A ) + A C ABmodF( ) (...(( A29B + A28B) + A27B) A B) + A BmodF( ) Let D j A29 j B, for j,,..., 29 C j C j 8 + D j, for j,,...,29, and C Then C C 29
12 Generatng the Product D j A29 j B, for j,,..., 29 C j C j j 8 + D, for j,,...,29, and C Clock cycle Output of M Output of M4 Output D C D D C 8 C 2 D 2 C 8 C 2 28 D 28 C 27 8 C D 29 C 28 8 C 29 C 2
13 M3: Constant multpler γ 8 α Logc equaton Crcut γ α α α α α 5 +,, ,9, ,75,... 82,83, Gate count 8 XOR gates 3
14 M: Partal product generator A j B Functon 7 A j B ( a + a a7 ) B 7 a B + a B a B Components Seven constant multplers Eght AND networks A XOR network 7 4
15 M: Partal product generator (Cont d) Archtecture 5
16 M: Partal product generator (Cont d) Constant multplers j α, j,2,,7. Smlar archtecture as M3 ( 8 α) 6
17 M: Partal product generator (Cont d) AND network 7
18 M: Partal product generator (Cont d) XOR network 7 XOR sub networks M: Sub XOR network 8
19 Alternatve BPWS fnte feld multpler Least sgnfcant word (LSW) frst archtecture One addtonal m-bt regster needed One multplcaton stll needs 3 clock cycles Archtecture: 9
20 General BPWS fnte feld multpler Fnte feld: GF(2 m ) Word sze: p Components: -One p m partal product generator -One adder (m XOR gates) -One constant FFM -One m-bt regster 2
21 Comparsons Multpler Fnte feld Speed (Clock cycle) Crcut complety Parallel GF(2 233 ) AND gates XOR gates Seral 233 two 233-bt regsters 233 AND gates 234 XOR gates Proposed 3 8*233 AND gates BPWS 8* XOR gates one 233-bt regster Alternatve 3 8*233 AND gates BPWS 8* XOR gates Two 233-bt regsters General BPWS Trnomal GF(2 m ) Celng functon of (m/p) p*m AND gates p*m+(p+)p/2 XOR gates (<k<m/2 One m-bt regster p word wdth) 2
22 Target VLSI Desgn ASIC chp whch can perform multplcaton and squarng n GF(2 233 ) Specfcatons Frequency: 5MHz Gate counts: 4 Desgn flow CMC dgtal desgn flow Technology TSMC.8 µm CMOS technology 22
23 Hardware schematc 23
24 Fnal results and comparsons Multpler Frequency (MHz) Feld sze # of cells Gate counts Area (µm 2 ) VLSI technology BPWS (ma. 3) TSMC.8µm CMOS Squarer Classcal [] LUTs FFs N/A Xln FPGA XC2V6- ff57-4 Hans et al MSD [2] LUTs 2948 FFs 3664 N/A Xln FPGA Vrte-II XCV2E-7 Souch et al 8288 [3] *8*288 ANDs 2*8*288 XORs 3*(8+288) FFs 4544 N/A ALTERA FPGA EPFK25AG C
25 Chp Layout 25
26 Conclusons Bt-parallel word-seral multpler archtectures are proposed. The proposed archtectures are not only useful for smart card but also benefcal to other securty processors. An ASIC chp whch has the proposed BPWS multpler and bt parallel squarer s mplemented. A novel 8233 partal product generator s desgned. Future work epected s to use ths multpler n securty processor for smart card. 26
27 References [] Grabbe C.,Bednara M., Tech J.,Von Zur Gathen J., Shokrollah J, FPGA desgns of parallel hgh performance GF(2^233) multplers, Crcuts and Systems, 23. ISCAS '3. Proceedngs of the 23 Internatonal Symposum on, Volume: 2, May 23 [2] Hans Eberle, Sheuelng Chang, Nls Gura, Sumt Gupta, Dnel Fnchelsten, Edouard Goupy, Douglas Stebla, An End-to-End Systems Approach to Ellptc Curve Cryptography Sun Mcrosytems Laboratores [3] Souch Okada, Naoya Tor, Kouch Itoh, Masahko Takenaka, Implementaton of Ellptc Curve Cryptographc Coprocessor over GF(2^m) on an FPGA ', C.K. Koc and C. Paar (Eds.): CHES 2, LNCS 965, pp. 25-4, 2. Sprnger-Verlag Berln Hedelberg 2 27
28 Queston? 28
29 THANK YOU! 29
A Reconfigurable System on Chip Implementation for Elliptic Curve Cryptography over GF(2 n )
Reconfgurable System on Chp Implementaton for Ellptc Curve Cryptography over GF( n ) Mchael Jung, M. Ernst, F. Madlener, S. Huss, R. lümel Integrated Crcuts and Systems Lab Computer Scence Department Darmstadt
More informationTOPICS MULTIPLIERLESS FILTER DESIGN ELEMENTARY SCHOOL ALGORITHM MULTIPLICATION
1 2 MULTIPLIERLESS FILTER DESIGN Realzaton of flters wthout full-fledged multplers Some sldes based on support materal by W. Wolf for hs book Modern VLSI Desgn, 3 rd edton. Partly based on followng papers:
More informationThe Improved Montgomery Scalar Multiplication Algorithm with DPA Resistance Yanqi Xu, Lin Chen, Moran Li
nd Internatonal Conference on Electrcal, Computer Engneerng and Electroncs (ICECEE 015) The Improved Montgomery Scalar Multplcaton Algorthm wth DPA Resstance Yanq Xu, Ln Chen, Moran L Informaton Scence
More informationA New Design of Multiplier using Modified Booth Algorithm and Reversible Gate Logic
Internatonal Journal of Computer Applcatons Technology and Research A New Desgn of Multpler usng Modfed Booth Algorthm and Reversble Gate Logc K.Nagarjun Department of ECE Vardhaman College of Engneerng,
More informationCryptanalysis of pairing-free certificateless authenticated key agreement protocol
Cryptanalyss of parng-free certfcateless authentcated key agreement protocol Zhan Zhu Chna Shp Development Desgn Center CSDDC Wuhan Chna Emal: zhuzhan0@gmal.com bstract: Recently He et al. [D. He J. Chen
More informationSpeeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem
H.K. Pathak et. al. / (IJCSE) Internatonal Journal on Computer Scence and Engneerng Speedng up Computaton of Scalar Multplcaton n Ellptc Curve Cryptosystem H. K. Pathak Manju Sangh S.o.S n Computer scence
More informationDepartment of Electrical & Electronic Engineeing Imperial College London. E4.20 Digital IC Design. Median Filter Project Specification
Desgn Project Specfcaton Medan Flter Department of Electrcal & Electronc Engneeng Imperal College London E4.20 Dgtal IC Desgn Medan Flter Project Specfcaton A medan flter s used to remove nose from a sampled
More informationPerformance Analysis of the Postcomputation- Based Generic-Point Parallel Scalar Multiplication Method
P a g e 3 Vol. 1 Issue 11 (Ver. 1.) October 1 Global Journal of Computer Scence and Technology Performance Analyss of the Postcomputaton- Based Generc-Pont Parallel Scalar Multplcaton Method Tur F. Al-Soman
More informationFPGA accelerated multipliers over binary composite fields constructed via low hamming weight irreducible polynomials
FPGA accelerated multipliers over binary composite fields constructed via low hamming weight irreducible polynomials C. Shu, S. Kwon and K. Gaj Abstract: The efficient design of digit-serial multipliers
More informationScalable RSA Processor in Reconfigurable Hardware - a SoC Building Block
Scalable RSA Processor n Reconfgurable Hardare - a SoC Buldng Block Vktor Fscher and Mloš Drutarovský Laboratore ratement du Sgnal et Instrumentaton, Unté Mxte de Recherche CNRS 556, Unversté Jean Monnet,
More informationDESIGN OF A COMPACT MODULAR EXPONENTIATION ACCELERATOR FOR MODERN FPGA DEVICES
Copyrght - World Automaton Congress (WAC) 2006, July 24-26, Budapest, Hungary DESIGN OF A COMPACT MODULAR EXPONENTIATION ACCELERATOR FOR MODERN FPGA DEVICES Tmo Alho, Tampere Unv. of Tech., Fnland, tmo.a.alho@tut.f
More informationPower Efficient Design and Implementation of a Novel Constant Correction Truncated Multiplier
APSIPA ASC 11 X an Power Effcent Desgn and Implementaton of a Novel Constant Correcton Truncated Multpler Yu Ren, Dong Wang, Lebo Lu, Shouy Yn and Shaojun We Tsnghua Unversty, Bejng E-mal: reneereny@gmal.com
More informationThe stream cipher MICKEY
The stream cpher MICKEY-128 2.0 Steve Babbage Vodafone Group R&D, Newbury, UK steve.babbage@vodafone.com Matthew Dodd Independent consultant matthew@mdodd.net www.mdodd.net 30 th June 2006 Abstract: We
More informationRSA /2002/13(08) , ); , ) RSA RSA : RSA RSA [2] , [1,4]
1000-9825/2002/13(081729-06 2002 Journal of Software Vol13, No8 RSA 1,2 1, 1 (, 200433; 2 (, 200070 E-mal: yfhu@fudaneducn http://wwwfudaneducn : RSA RSA :, ; RSA,,, RSA,, : ; RSA ; ;RSA; : TP309 : A RSA
More informationImplementation of Parallel Multiplier Accumulator based on Radix-2 Modified Booth Algorithm Shashi Prabha Singh 1 Uma Sharma 2
IJSRD - Internatonal Journal for Scentfc Research & Development Vol. 3, Issue 05, 2015 ISSN (onlne): 2321-0613 Implementaton of Parallel Multpler Accumulator based on Radx-2 Modfed Booth Algorthm Shash
More informationFPGA Implementation of Pipelined CORDIC Sine Cosine Digital Wave Generator
FPGA Implementaton of Ppelned CORDIC Sne Cosne Dgtal Wave Generator Navdeep Prashar 1 and Balwnder Sngh 1- Acadmc and Consultancy Servces Dvson, Centre for Development of Advanced Computng(C-DAC, Mohal,
More informationTowards strong security in embedded and pervasive systems: energy and area optimized serial polynomial multipliers in GF(2 k )
Towards strong securty n ebedded and pervasve systes: energy and area optzed seral polynoal ultplers n GF( k ) Zoya Dyka, Peter Langendoerfer, Frank Vater and Steffen Peter IHP, I Technologepark 5, D-53
More informationLecture 5, October 8. DES System (Modification)
Lecture 5, October 8. 10/10/01 Gene Tsudk, ICS 268 Fall 2001 1 Encrypton Process 64 Bt Plantext Intal Permutaton 32 Bt L0 32 Bt R0 + F(R0,K1) DES System (Modfcaton) Festel Network Buldng Block Key Schedule
More informationA Novel, Low-Power Array Multiplier Architecture
A Noel, Low-Power Array Multpler Archtecture by Ronak Bajaj, Saransh Chhabra, Sreehar Veeramachanen, MB Srnas n 9th Internatonal Symposum on Communcaton and Informaton Technology 29 (ISCIT 29) Songdo -
More informationImplementation Options for Finite Field Arithmetic for Elliptic Curve Cryptosystems Christof Paar Electrical & Computer Engineering Dept. and Computer Science Dept. Worcester Polytechnic Institute Worcester,
More informationCSE4210 Architecture and Hardware for DSP
4210 Archtecture and Hardware for DSP Lecture 1 Introducton & Number systems Admnstratve Stuff 4210 Archtecture and Hardware for DSP Text: VLSI Dgtal Sgnal Processng Systems: Desgn and Implementaton. K.
More informationQuadratic speedup for unstructured search - Grover s Al-
Quadratc speedup for unstructured search - Grover s Al- CS 94- gorthm /8/07 Sprng 007 Lecture 11 001 Unstructured Search Here s the problem: You are gven a boolean functon f : {1,,} {0,1}, and are promsed
More informationLecture 4: Adders. Computer Systems Laboratory Stanford University
Lecture 4: Adders Computer Systems Laboratory Stanford Unversty horowtz@stanford.edu Copyrght 2004 by Mark Horowtz (w/ Fgures from Hgh-Performance Mcroprocessor Desgn IEEE And Fgures from Bora Nkolc 1
More informationAre standards compliant Elliptic Curve Cryptosystems feasible on RFID?
Are standards compliant Elliptic Curve Cryptosystems feasible on RFID? Sandeep S. Kumar and Christof Paar Horst Görtz Institute for IT Security, Ruhr-Universität Bochum, Germany Abstract. With elliptic
More informationModule #6: Combinational Logic Design with VHDL Part 2 (Arithmetic)
ECOM4311 Dgtal Systems Desgn : Combnatonal Logc Desgn wth VHDL Part 2 (Arthmetc) - A crcut that compares dgtal values (.e., Equal, Greater Than, Less Than) Agenda 1. 2. Adders (Rpple Carry, Carry-Look-Ahead)
More informationHigh-Speed Low-Complexity Reed-Solomon Decoder using Pipelined Berlekamp-Massey Algorithm and Its Folded Architecture
JOURNAL OF SEMICONUCTOR TECHNOLOGY AN SCIENCE, VOL., NO.3, SEPTEMBER, 2 93 Hgh-Speed Low-Complexty Reed-Solomon ecoder usng Ppelned Berlekamp-Massey Algorthm and Its Folded Archtecture Jeong-In Park, Khoon
More informationAN IMPROVED LOW LATENCY SYSTOLIC STRUCTURED GALOIS FIELD MULTIPLIER
Indian Journal of Electronics and Electrical Engineering (IJEEE) Vol.2.No.1 2014pp1-6 available at: www.goniv.com Paper Received :05-03-2014 Paper Published:28-03-2014 Paper Reviewed by: 1. John Arhter
More informationCube Attack on Reduced-Round Quavium
3rd Internatonal onference on Mechatroncs and Industral Informatcs (IMII 05 ube Attac on Reduced-Round Quavum Shyong Zhang, a *, Gonglang hen,b and Janhua L,c School of Informaton Securty Engneerng, Shangha
More informationSome Consequences. Example of Extended Euclidean Algorithm. The Fundamental Theorem of Arithmetic, II. Characterizing the GCD and LCM
Example of Extended Eucldean Algorthm Recall that gcd(84, 33) = gcd(33, 18) = gcd(18, 15) = gcd(15, 3) = gcd(3, 0) = 3 We work backwards to wrte 3 as a lnear combnaton of 84 and 33: 3 = 18 15 [Now 3 s
More informationPART 8. Partial Differential Equations PDEs
he Islamc Unverst of Gaza Facult of Engneerng Cvl Engneerng Department Numercal Analss ECIV 3306 PAR 8 Partal Dfferental Equatons PDEs Chapter 9; Fnte Dfference: Ellptc Equatons Assocate Prof. Mazen Abualtaef
More informationHigh Performance Rotation Architectures Based on the Radix-4 CORDIC Algorithm
IEEE TRANSACTIONS ON COMPUTERS, VOL. 46, NO. 8, AUGUST 997 855 Hgh Performance Rotaton Archtectures Based on the Radx-4 CORDIC Algorthm Elsardo Antelo, Julo Vllalba, Javer D. Bruguera, and Emlo L. Zapata
More informationEfficient FPGA-based Karatsuba multipliers for polynomials over F 2
JOACHIM VON ZUR GATHEN & JAMSHID SHOKROLLAHI (2005). Efficient FPGA-based Karatsuba multipliers for polynomials over F2. In Selected Areas in Cryptography (SAC 2005), BART PRENEEL & STAFFORD TAVARES, editors,
More informationA Fast FPGA based Architecture for Determining the Sine and Cosine Value
Proc. of Int. Conf. on Advances n Communcaton, Network, and Computng, CNC A Fast FPGA based Archtecture for Determnng the Sne and Cosne Value Atanu Dey, Tanma Bhattacharyya, Abul Hasnat and Santanu Halder
More informationLecture 10 Support Vector Machines II
Lecture 10 Support Vector Machnes II 22 February 2016 Taylor B. Arnold Yale Statstcs STAT 365/665 1/28 Notes: Problem 3 s posted and due ths upcomng Frday There was an early bug n the fake-test data; fxed
More informationLogic effort and gate sizing
EEN454 Dgtal Integrated rcut Desgn Logc effort and gate szng EEN 454 Introducton hp desgners face a bewlderng arra of choces What s the best crcut topolog for a functon? How man stages of logc gve least
More informationPost-quantum Key Exchange Protocol Using High Dimensional Matrix
Post-quantum Key Exchange Protocol Usng Hgh Dmensonal Matrx Rchard Megrelshvl I. J. Tbls State Unversty rchard.megrelshvl@tsu.ge Melksadeg Jnkhadze Akak Tseretel State Unversty Kutas, Georga mn@yahoo.com
More informationA Low Error and High Performance Multiplexer-Based Truncated Multiplier
IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, VOL. 18, NO. 1, DECEMBER 010 1767 A Low Error and Hgh Performance Multplexer-Based Truncated Multpler Chp-Hong Chang and Rav Kumar Satzoda
More informationApplication of Nonbinary LDPC Codes for Communication over Fading Channels Using Higher Order Modulations
Applcaton of Nonbnary LDPC Codes for Communcaton over Fadng Channels Usng Hgher Order Modulatons Rong-Hu Peng and Rong-Rong Chen Department of Electrcal and Computer Engneerng Unversty of Utah Ths work
More informationParallel MAC Based On Radix-4 & Radix-8 Booth Encodings
Shankey Goel. et al. / Internatonal Journal of Engneerng Scence an Technology (IJEST) Parallel MAC Base On Rax-4 & Rax-8 Booth Encongs SHAKE GOEL Stuent, Department of Electroncs & Communcaton Engneerng
More informationImproving XOR-Dominated Circuits by Exploiting Dependencies between Operands
Improvng XOR-Domnated Crcuts by Explotng Dependences between Operands Ajay K. Verma AjayKumar.Verma@epfl.ch Paolo Ienne Paolo.Ienne@epfl.ch Ecole Polytechnque Fédérale de Lausanne (EPFL) School of Computer
More informationAn Efficient Eligible Error Locator Polynomial Searching Algorithm and Hardware Architecture for One-Pass Chase BCH Codes Decoding
Ths artcle has been accepted for publcaton n a future ssue of ths journal, but has not been fully edted. Content may change pror to fnal publcaton. Ctaton nformaton: DOI.9/TCSII.6.58587, IEEE An Effcent
More informationUse of Sparse and/or Complex Exponents in Batch Verification of Exponentiations
Use of Sparse and/or Complex Exponents n Batch Verfcaton of Exponentatons Jung Hee Cheon 1 and Dong Hoon Lee 2 1 Department of Mathematcs, Seoul Natonal Unversty jhcheon@math.snu.ac.kr, 2 Natonal Securty
More informationMessage modification, neutral bits and boomerangs
Message modfcaton, neutral bts and boomerangs From whch round should we start countng n SHA? Antone Joux DGA and Unversty of Versalles St-Quentn-en-Yvelnes France Jont work wth Thomas Peyrn 1 Dfferental
More information= z 20 z n. (k 20) + 4 z k = 4
Problem Set #7 solutons 7.2.. (a Fnd the coeffcent of z k n (z + z 5 + z 6 + z 7 + 5, k 20. We use the known seres expanson ( n+l ( z l l z n below: (z + z 5 + z 6 + z 7 + 5 (z 5 ( + z + z 2 + z + 5 5
More informationIntroduction to Density Functional Theory. Jeremie Zaffran 2 nd year-msc. (Nanochemistry)
Introducton to Densty Functonal Theory Jereme Zaffran nd year-msc. (anochemstry) A- Hartree appromatons Born- Oppenhemer appromaton H H H e The goal of computatonal chemstry H e??? Let s remnd H e T e
More informationA Simple Architectural Enhancement for Fast and Flexible Elliptic Curve Cryptography over Binary Finite Fields GF(2 m )
A Simple Architectural Enhancement for Fast and Flexible Elliptic Curve Cryptography over Binary Finite Fields GF(2 m ) Stefan Tillich, Johann Großschädl Institute for Applied Information Processing and
More informationEstimating Delays. Gate Delay Model. Gate Delay. Effort Delay. Computing Logical Effort. Logical Effort
Estmatng Delas Would be nce to have a back of the envelope method for szng gates for speed Logcal Effort ook b Sutherland, Sproull, Harrs Chapter s on our web page Gate Dela Model Frst, normalze a model
More informationHardware Implementation of Elliptic Curve Cryptography over Binary Field
I. J. Computer Network and Information Security, 2012, 2, 1-7 Published Online March 2012 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijcnis.2012.02.01 Hardware Implementation of Elliptic Curve Cryptography
More informationEEE 241: Linear Systems
EEE : Lnear Systems Summary #: Backpropagaton BACKPROPAGATION The perceptron rule as well as the Wdrow Hoff learnng were desgned to tran sngle layer networks. They suffer from the same dsadvantage: they
More informationA Hybrid Variational Iteration Method for Blasius Equation
Avalable at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 1932-9466 Vol. 10, Issue 1 (June 2015), pp. 223-229 Applcatons and Appled Mathematcs: An Internatonal Journal (AAM) A Hybrd Varatonal Iteraton Method
More informationHIGH-SPEED MULTI OPERAND ADDITION UTILIZING FLAG BITS VIBHUTI DAVE DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING
HIGH-SPEED MULTI OPERAND ADDITION UTILIZING FLAG BITS BY VIBHUTI DAVE DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING Submtted n partal fulfllment of the requrements for the degree of Doctor of Phlosophy
More informationMontgomery Multiplier and Squarer in GF(2 m )
Montgomery Multiplier and Squarer in GF( m ) Huapeng Wu The Centre for Applied Cryptographic Research Department of Combinatorics and Optimization University of Waterloo, Waterloo, Canada h3wu@cacrmathuwaterlooca
More informationImplementation and Study of Reversible Binary Comparators
Implementaton and Study of Reversble Bnary Comparators Harth M, C Vasanthanayak Abstract Reversble logc contans a feature of recoverng bt loss from unque nput-output mappng. Usng tradtonal (rreversble)
More informationRISC Processors. Hierarchical VLSI Design. Multiple Layered Architecture. 6. Case Study: Formal Verification of RISC Processors using HOL
6. Case Study: Formal Verfcaton of RISC Processors usng HOL RISC Processors Motvaton RISC Verfcaton Model Dervng Formal Specfcatons Verfcaton Tasks Ppelne Correctness Processor Specfc Defntons Expermental
More informationABHELSINKI UNIVERSITY OF TECHNOLOGY
On Repeated Squarings in Binary Fields Kimmo Järvinen Helsinki University of Technology August 14, 2009 K. Järvinen On Repeated Squarings in Binary Fields 1/1 Introduction Repeated squaring Repeated squaring:
More informationVariability-Driven Module Selection with Joint Design Time Optimization and Post-Silicon Tuning
Asa and South Pacfc Desgn Automaton Conference 2008 Varablty-Drven Module Selecton wth Jont Desgn Tme Optmzaton and Post-Slcon Tunng Feng Wang, Xaoxa Wu, Yuan Xe The Pennsylvana State Unversty Department
More informationA MORE SECURE MFE MULTIVARIATE PUBLIC KEY ENCRYPTION SCHEME *
Internatonal Journal of Computer Scence and Applcatons Vol No pp - 00 Technomathematcs Research Foundaton A ORE SECURE FE ULTIVARIATE PUBLIC KE ENCRPTION SCHEE n Wang School of Telecommuncatons Engneerng
More informationThe Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL
The Synchronous 8th-Order Dfferental Attack on 12 Rounds of the Block Cpher HyRAL Yasutaka Igarash, Sej Fukushma, and Tomohro Hachno Kagoshma Unversty, Kagoshma, Japan Emal: {garash, fukushma, hachno}@eee.kagoshma-u.ac.jp
More informationDesign and Performance testing of Arithmetic Operators Library for Cryptographic Applications
IJCSES Internatonal Journal of Coputer Scences and Engneerng Systes, Vol., No.3, July 7 CSES Internatonal c7 ISSN 973-446 Desgn and Perforance testng of Arthetc Operators Lbrary for Cryptographc Applcatons
More informationSemi-supervised Classification with Active Query Selection
Sem-supervsed Classfcaton wth Actve Query Selecton Jao Wang and Swe Luo School of Computer and Informaton Technology, Beng Jaotong Unversty, Beng 00044, Chna Wangjao088@63.com Abstract. Labeled samples
More informationEfficient Fixed Base Exponentiation and Scalar Multiplication based on a Multiplicative Splitting Exponent Recoding
Effcent Fxed Base Exponentaton and Scalar Multplcaton based on a Multplcatve Splttng Exponent Recodng Jean-Marc Robert, Chrstophe Negre, Thomas Plantard To cte ths verson: Jean-Marc Robert, Chrstophe Negre,
More informationExercises. 18 Algorithms
18 Algorthms Exercses 0.1. In each of the followng stuatons, ndcate whether f = O(g), or f = Ω(g), or both (n whch case f = Θ(g)). f(n) g(n) (a) n 100 n 200 (b) n 1/2 n 2/3 (c) 100n + log n n + (log n)
More informationREDUCTION MODULO p. We will prove the reduction modulo p theorem in the general form as given by exercise 4.12, p. 143, of [1].
REDUCTION MODULO p. IAN KIMING We wll prove the reducton modulo p theorem n the general form as gven by exercse 4.12, p. 143, of [1]. We consder an ellptc curve E defned over Q and gven by a Weerstraß
More informationSuppose that there s a measured wndow of data fff k () ; :::; ff k g of a sze w, measured dscretely wth varable dscretzaton step. It s convenent to pl
RECURSIVE SPLINE INTERPOLATION METHOD FOR REAL TIME ENGINE CONTROL APPLICATIONS A. Stotsky Volvo Car Corporaton Engne Desgn and Development Dept. 97542, HA1N, SE- 405 31 Gothenburg Sweden. Emal: astotsky@volvocars.com
More informationOn the Interval Zoro Symmetric Single-step Procedure for Simultaneous Finding of Polynomial Zeros
Appled Mathematcal Scences, Vol. 5, 2011, no. 75, 3693-3706 On the Interval Zoro Symmetrc Sngle-step Procedure for Smultaneous Fndng of Polynomal Zeros S. F. M. Rusl, M. Mons, M. A. Hassan and W. J. Leong
More informationRepresentations of Elementary Functions Using Binary Moment Diagrams
Representatons of Elementary Functons Usng Bnary Moment Dagrams Tsutomu Sasao Department of Computer Scence and Electroncs, Kyushu Insttute of Technology Izua 82-852, Japan Shnobu Nagayama Department of
More information2 More examples with details
Physcs 129b Lecture 3 Caltech, 01/15/19 2 More examples wth detals 2.3 The permutaton group n = 4 S 4 contans 4! = 24 elements. One s the dentty e. Sx of them are exchange of two objects (, j) ( to j and
More informationGrover s Algorithm + Quantum Zeno Effect + Vaidman
Grover s Algorthm + Quantum Zeno Effect + Vadman CS 294-2 Bomb 10/12/04 Fall 2004 Lecture 11 Grover s algorthm Recall that Grover s algorthm for searchng over a space of sze wors as follows: consder the
More informationDual-Field Arithmetic Unit for GF(p) and GF(2 m ) *
Institute for Applied Information Processing and Communications Graz University of Technology Dual-Field Arithmetic Unit for GF(p) and GF(2 m ) * CHES 2002 Workshop on Cryptographic Hardware and Embedded
More informationFast arithmetic for polynomials over F 2 in hardware
Fast arithmetic for polynomials over F 2 in hardware JOACHIM VON ZUR GATHEN & JAMSHID SHOKROLLAHI (200). Fast arithmetic for polynomials over F2 in hardware. In IEEE Information Theory Workshop (200),
More informationA New Bit-Serial Architecture for Field Multiplication Using Polynomial Bases
A New Bit-Serial Architecture for Field Multiplication Using Polynomial Bases Arash Reyhani-Masoleh Department of Electrical and Computer Engineering The University of Western Ontario London, Ontario,
More informationA New Scrambling Evaluation Scheme based on Spatial Distribution Entropy and Centroid Difference of Bit-plane
A New Scramblng Evaluaton Scheme based on Spatal Dstrbuton Entropy and Centrod Dfference of Bt-plane Lang Zhao *, Avshek Adhkar Kouch Sakura * * Graduate School of Informaton Scence and Electrcal Engneerng,
More informationAging model for a 40 V Nch MOS, based on an innovative approach F. Alagi, R. Stella, E. Viganò
Agng model for a 4 V Nch MOS, based on an nnovatve approach F. Alag, R. Stella, E. Vganò ST Mcroelectroncs Cornaredo (Mlan) - Italy Agng modelng WHAT IS AGING MODELING: Agng modelng s a tool to smulate
More informationOver-Temperature protection for IGBT modules
Over-Temperature protecton for IGBT modules Ke Wang 1, Yongjun Lao 2, Gaosheng Song 1, Xanku Ma 1 1 Mtsubsh Electrc & Electroncs (Shangha) Co., Ltd., Chna Room2202, Tower 3, Kerry Plaza, No.1-1 Zhongxns
More informationAlgebraic properties of polynomial iterates
Algebrac propertes of polynomal terates Alna Ostafe Department of Computng Macquare Unversty 1 Motvaton 1. Better and cryptographcally stronger pseudorandom number generators (PRNG) as lnear constructons
More informationExhaustive Search for the Binary Sequences of Length 2047 and 4095 with Ideal Autocorrelation
Exhaustve Search for the Bnary Sequences of Length 047 and 4095 wth Ideal Autocorrelaton 003. 5. 4. Seok-Yong Jn and Hong-Yeop Song. Yonse Unversty Contents Introducton Background theory Ideal autocorrelaton
More informationAttacks on RSA The Rabin Cryptosystem Semantic Security of RSA Cryptology, Tuesday, February 27th, 2007 Nils Andersen. Complexity Theoretic Reduction
Attacks on RSA The Rabn Cryptosystem Semantc Securty of RSA Cryptology, Tuesday, February 27th, 2007 Nls Andersen Square Roots modulo n Complexty Theoretc Reducton Factorng Algorthms Pollard s p 1 Pollard
More informationAugmented Broadcaster Identity-based Broadcast Encryption
Augmented Broadcaster Identty-based Broadcast Encrypton Janhong Zhang Yuwe Xu Zhpeng Chen Insttuton of Image Processng and Pattern Recognton North Chna Unversty of Technology Bejng Chna 100144 ywxupaper@163com
More informationCHAPTER 4 MAX-MIN AVERAGE COMPOSITION METHOD FOR DECISION MAKING USING INTUITIONISTIC FUZZY SETS
56 CHAPER 4 MAX-MIN AVERAGE COMPOSIION MEHOD FOR DECISION MAKING USING INUIIONISIC FUZZY SES 4.1 INRODUCION Intutonstc fuzz max-mn average composton method s proposed to construct the decson makng for
More informationOne-sided finite-difference approximations suitable for use with Richardson extrapolation
Journal of Computatonal Physcs 219 (2006) 13 20 Short note One-sded fnte-dfference approxmatons sutable for use wth Rchardson extrapolaton Kumar Rahul, S.N. Bhattacharyya * Department of Mechancal Engneerng,
More informationProbability-Theoretic Junction Trees
Probablty-Theoretc Juncton Trees Payam Pakzad, (wth Venkat Anantharam, EECS Dept, U.C. Berkeley EPFL, ALGO/LMA Semnar 2/2/2004 Margnalzaton Problem Gven an arbtrary functon of many varables, fnd (some
More informationImpossible differential attacks on 4-round DES-like ciphers
INENAIONA JOUNA OF COMPUES AND COMMUNICAIONS Volume 9, 2015 Impossble dfferental attacks on 4-round DES-lke cphers Pavol Zajac Abstract Data Encrypton Standard was a man publc encrypton standard for more
More informationCombinational Circuit Design
Combnatonal Crcut Desgn Part I: Desgn Procedure and Examles Part II : Arthmetc Crcuts Part III : Multlexer, Decoder, Encoder, Hammng Code Combnatonal Crcuts n nuts Combnatonal Crcuts m oututs A combnatonal
More informationTheoretical Modeling of the Itoh-Tsujii Inversion Algorithm for Enhanced Performance on k-lut based FPGAs
Theoretical Modeling of the Itoh-Tsujii Inversion Algorithm for Enhanced Performance on k-lut based FPGAs Sujoy Sinha Roy, Chester Rebeiro and Debdeep Mukhopadhyay Department of Computer Science and Engineering
More informationNUMERICAL DIFFERENTIATION
NUMERICAL DIFFERENTIATION 1 Introducton Dfferentaton s a method to compute the rate at whch a dependent output y changes wth respect to the change n the ndependent nput x. Ths rate of change s called the
More informationHardware Implementation of Elliptic Curve Processor over GF (p)
Hardware Implementation of Elliptic Curve Processor over GF (p) Sıddıka Berna Örs, Lejla Batina, Bart Preneel K.U. Leuven ESAT/COSIC Kasteelpark Arenberg 10 B-3001 Leuven-Heverlee, Belgium {Siddika.BernaOrs,
More informationFast Variants of RSA
Fast Varants of RSA Dan Boneh dabo@cs.stanford.edu Hovav Shacham hovav@cs.stanford.edu Abstract We survey four varants of RSA desgned to speed up RSA decrypton and sgnng. We only consder varants that are
More informationDiscussion 11 Summary 11/20/2018
Dscusson 11 Summary 11/20/2018 1 Quz 8 1. Prove for any sets A, B that A = A B ff B A. Soluton: There are two drectons we need to prove: (a) A = A B B A, (b) B A A = A B. (a) Frst, we prove A = A B B A.
More informationDesign and Implementation of a Low Power RSA Processor for Smartcard
I.J.Modern Education and Computer Science, 2011, 3, 8-14 Published Online June 2011 in MECS (http://www.mecs-press.org/) esign and Implementation of a Low Power RSA Processor for Smartcard Zhen Huang Institute
More informationResearch Article On the Use of an Algebraic Signature Analyzer for Mixed-Signal Systems Testing
VLSI Desgn, Artcle ID 46597, 8 pages http://dx.do.org/.55/24/46597 Research Artcle On the Use of an Algebrac Sgnature Analyzer for Mxed-Sgnal Systems Testng Vadm Geurkov and Lev Krschan Department of Electrcal
More informationLETTER Skew-Frobenius Maps on Hyperelliptic Curves
189 Skew-Frobenus Maps on Hyperellptc Curves Shunj KOZAKI a, Nonmember, Kazuto MATSUO, Member, and Yasutomo SHIMBARA, Nonmember SUMMARY Scalar multplcaton methods usng the Frobenus maps are known for effcent
More informationLecture 4: Universal Hash Functions/Streaming Cont d
CSE 5: Desgn and Analyss of Algorthms I Sprng 06 Lecture 4: Unversal Hash Functons/Streamng Cont d Lecturer: Shayan Oves Gharan Aprl 6th Scrbe: Jacob Schreber Dsclamer: These notes have not been subjected
More informationExistence of Two Conjugate Classes of A 5 within S 6. by Use of Character Table of S 6
Internatonal Mathematcal Forum, Vol. 8, 2013, no. 32, 1591-159 HIKARI Ltd, www.m-hkar.com http://dx.do.org/10.12988/mf.2013.3359 Exstence of Two Conjugate Classes of A 5 wthn S by Use of Character Table
More informationAn Algorithm for Inversion in GF(2 m ) Suitable for Implementation Using a Polynomial Multiply Instruction on GF(2)
An Algorithm for Inversion in GF2 m Suitable for Implementation Using a Polynomial Multiply Instruction on GF2 Katsuki Kobayashi, Naofumi Takagi, and Kazuyoshi Takagi Department of Information Engineering,
More informationTHE CHINESE REMAINDER THEOREM. We should thank the Chinese for their wonderful remainder theorem. Glenn Stevens
THE CHINESE REMAINDER THEOREM KEITH CONRAD We should thank the Chnese for ther wonderful remander theorem. Glenn Stevens 1. Introducton The Chnese remander theorem says we can unquely solve any par of
More informationA Parallel Method for the Computation of Matrix Exponential based on Truncated Neumann Series
A Parallel Method for the Computation of Matrix Exponential based on Truncated Neumann Series V. S. Dimitrov 12, V. Ariyarathna 3, D. F. G. Coelho 1, L. Rakai 1, A. Madanayake 3, R. J. Cintra 4 1 ECE Department,
More informationVARIATION OF CONSTANT SUM CONSTRAINT FOR INTEGER MODEL WITH NON UNIFORM VARIABLES
VARIATION OF CONSTANT SUM CONSTRAINT FOR INTEGER MODEL WITH NON UNIFORM VARIABLES BÂRZĂ, Slvu Faculty of Mathematcs-Informatcs Spru Haret Unversty barza_slvu@yahoo.com Abstract Ths paper wants to contnue
More informationFormation of Pseudo-Random Sequences of Maximum Period of Transformation of Elliptic Curves
Internatonal Journal of Computatonal Engneerng Research Vol 03 Issue 5 Formaton of Pseudo-Random Sequences of Maxmum Perod of Transformaton of Ellptc Curves Alexandr Kuznetsov 1 Dmtry Prokopovych-Tkachenko
More informationUncertainty in measurements of power and energy on power networks
Uncertanty n measurements of power and energy on power networks E. Manov, N. Kolev Department of Measurement and Instrumentaton, Techncal Unversty Sofa, bul. Klment Ohrdsk No8, bl., 000 Sofa, Bulgara Tel./fax:
More informationHardening the ElGamal Cryptosystem in the Setting of the Second Group of Units
54 The Internatonal Arab Journal of Informaton Technology, Vol., o. 5, September 204 Hardenng the ElGamal Cryptosystem n the Settng of the Second Group of Unts Ramz Haraty, Abdulasser ElKassar, and Suzan
More information