Advanced cryptography - Project

Size: px
Start display at page:

Download "Advanced cryptography - Project"

Transcription

1 Advanced cryptography - Project Vanessa Vitse Master SCCI Vanessa VITSE (Institut Fourier) Advanced cryptography Master SCCI 1 / 12

2 Assignment Survey of some research topics related to elliptic and hyperelliptic curve cryptography. Work to do read 1-2 papers on the given topic write a report (<5 pages) describing the general problem and contributions of the papers implement the main algorithm and illustrate it on at least one example give a 20 min presentation (with illustration of your implementation) and answer to 5-10 min questions listen to other talks and ask at least one question during the 6h of presentation Vanessa VITSE (Institut Fourier) Advanced cryptography Master SCCI 2 / 12

3 1 Index calculus methods for attacking DLP on elliptic curves defined over extension fields E(F q n) 2 people P. Gaudry. Index calculus for abelian varieties of small dimension and the elliptic curve discrete logarithm problem. J. Symbolic Comput., 44(12): , K. Nagao. Decomposition attack for the Jacobian of a hyperelliptic curve over an extension field. In Algorithmic Number Theory ANTS-IX, vol of Lecture Notes in Comput. Sci., , Springer, Vanessa VITSE (Institut Fourier) Advanced cryptography Master SCCI 3 / 12

4 2 Non-hyperelliptic curves 2 people 1st part: Arithmetic on the Jacobian variety S. Arita. An addition algorithm in Jacobian of C ab curves. Discrete Appl. Math., 130(1):13 31, R. Cohen. Group law algorithms for Jacobian varieties of curves over finite fields. In Algebraic Geometry and its Applications, vol. 5 of Ser. Number Theory Appl., , World Sci. Pub., Vanessa VITSE (Institut Fourier) Advanced cryptography Master SCCI 4 / 12

5 2 Non-hyperelliptic curves 2 people 2nd part: Index calculus methods for attacking DLP on these groups C. Diem. An index calculus algorithm for plane curves of small degree. In Algorithmic Number Theory ANTS VII, vol of Lecture Notes in Comput. Sci., , Springer, Vanessa VITSE (Institut Fourier) Advanced cryptography Master SCCI 5 / 12

6 3 Isogeny volcanoes 2 people A. Sutherland. Isogeny volcanoes. In Algorithmic Number Theory ANTS X, vol. 1 of Open Book Ser., , Math. Sci. Pub., Vanessa VITSE (Institut Fourier) Advanced cryptography Master SCCI 6 / 12

7 4 Construction of pairing-friendly curves 2 people A. Miyaji, M. Nakabayashi, S. Takano. New explicit conditions of elliptic curve traces for FR-reduction. IEICE Transactions on Fundamentals, E84-A(5), , P. Barreto, M. Naehrig. Pairing-friendly elliptic curves of prime order. In Selected Areas in Cryptography SAC 2005, vol of Lecture Notes in Comput. Sci., , Springer, Vanessa VITSE (Institut Fourier) Advanced cryptography Master SCCI 7 / 12

8 5 Different coordinates for faster elliptic curve operations 1 person C. Doche, T. Lange. Arithmetic of Elliptic Curves. Chapter 13 of Handbook of Elliptic and Hyperelliptic Curve Cryptography, Chapman & Hall/CRC, D. Bernstein, P. Birkner, M. Joye, T. Lange, C. Peters. Twisted Edwards curves. In Progress in Cryptology AFRICACRYPT 2008, vol of Lecture Notes in Comput. Sci., , Springer, Vanessa VITSE (Institut Fourier) Advanced cryptography Master SCCI 8 / 12

9 6 Faster hyperelliptic curve arithmetic 1 person S. Duquesne, T. Lange. Arithmetic of Hyperelliptic Curves. Chapter 14 of Handbook of Elliptic and Hyperelliptic Curve Cryptography, Chapman & Hall/CRC, M. Jacobson, A. van den Poorten. Computational aspects of NUCOMP. In Algorithmic Number Theory ANTS V, vol of Lecture Notes in Comput. Sci., , Springer, Vanessa VITSE (Institut Fourier) Advanced cryptography Master SCCI 9 / 12

10 7 Hashing to elliptic curves 1 person T. Icart. How to hash into elliptic curves. In Advances in Cryptology CRYPTO 2009, vol of Lecture Notes in Comput. Sci., , Springer, E. Brier, J.-S. Coron, T. Icart, D. Madore, H. Randriam, M. Tibouchi. Efficient indifferentiable hashing into ordinary elliptic curves. In Advances in Cryptology CRYPTO 2010, vol of Lecture Notes in Comput. Sci., , Springer, Vanessa VITSE (Institut Fourier) Advanced cryptography Master SCCI 10 / 12

11 8 Side-channel attacks and counter-measures 2 people H. Cohen, G. Frey et al. Chapters 28 and 29 of Handbook of Elliptic and Hyperelliptic Curve Cryptography, Chapman & Hall/CRC, I. Blake, G. Seroussi, N. Smart. Chapters 4 and 5 of Advances in Elliptic Curve Cryptography, Cambridge University Press, Vanessa VITSE (Institut Fourier) Advanced cryptography Master SCCI 11 / 12

12 9 Faster pairings 1 person M. Scott. Implementing cryptographic pairings. In Pairing-based cryptography Pairing 2007, vol of Lecture Notes in Comput. Sci., , Springer, F. Vercauteren. Optimal pairings. IEEE Trans. Inform. Theory 56(1): , Vanessa VITSE (Institut Fourier) Advanced cryptography Master SCCI 12 / 12

A New Proposed Design of a Stream Cipher Algorithm: Modified Grain - 128

A New Proposed Design of a Stream Cipher Algorithm: Modified Grain - 128 International Journal of Computer and Information Technology (ISSN: 2279 764) Volume 3 Issue 5, September 214 A New Proposed Design of a Stream Cipher Algorithm: Modified Grain - 128 Norul Hidayah Lot

More information

Ultra-lightweight 8-bit Multiplicative Inverse Based S-box Using LFSR

Ultra-lightweight 8-bit Multiplicative Inverse Based S-box Using LFSR Ultra-lightweight -bit Multiplicative Inverse Based S-box Using LFSR Sourav Das Alcatel-Lucent India Ltd Email:sourav10101976@gmail.com Abstract. Most of the lightweight block ciphers are nibble-oriented

More information

Pseudorandom bit Generators for Secure Broadcasting Systems

Pseudorandom bit Generators for Secure Broadcasting Systems +00? IE.Nfejb~lV 4 Pseudorandom bit Generators for Secure Broadcasting Systems Chung-Huang Yang m Computer & Communication Research Laboratories Industrial Technology Research Institute Chutung, Hsinchu

More information

BLOCK CIPHER AND NON-LINEAR SHIFT REGISTER BASED RANDOM NUMBER GENERATOR QUALITY ANALYSIS

BLOCK CIPHER AND NON-LINEAR SHIFT REGISTER BASED RANDOM NUMBER GENERATOR QUALITY ANALYSIS Vilnius University INSTITUTE OF MATHEMATICS AND INFORMATICS INFORMATICS ENGINEERING (07 T) BLOCK CIPHER AND NON-LINEAR SHIFT REGISTER BASED RANDOM NUMBER GENERATOR QUALITY ANALYSIS Robertas Smaliukas October

More information

On the Construction of Lightweight Circulant Involutory MDS Matrices

On the Construction of Lightweight Circulant Involutory MDS Matrices On the Construction of Lightweight Circulant Involutory MDS Matrices Yongqiang Li a,b, Mingsheng Wang a a. State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy

More information

Modern Cryptography: Theory And Practice By Wenbo Mao

Modern Cryptography: Theory And Practice By Wenbo Mao Modern Cryptography: Theory And Practice By Wenbo Mao Modern Cryptography Theory And Practice Wenbo Mao Pdf Al - Modern Cryptography Theory And Practice Wenbo Mao Pdf. Home Package Modern Cryptography

More information

Optimum Composite Field S-Boxes Aimed at AES

Optimum Composite Field S-Boxes Aimed at AES Optimum Composite Field S-Boxes Aimed at AES R.THILLAIKKARASI Assistant professor, Department Of ECE, Salem college of Engineering and technology. Salem, India. K.VAISHNAVI Post Graduate Student M.E Applied

More information

Motives Study Group UCL

Motives Study Group UCL Motives Study Group UCL Study Group Organisers: Alex Betts & Chris Birkbeck January March 2018 Organisation The study groups will meet 12.00 13.30 every Wednesday, beginning on the 10th of January, in

More information

Introduction to Signal Processing D R. T A R E K T U T U N J I P H I L A D E L P H I A U N I V E R S I T Y

Introduction to Signal Processing D R. T A R E K T U T U N J I P H I L A D E L P H I A U N I V E R S I T Y Introduction to Signal Processing D R. T A R E K T U T U N J I P H I L A D E L P H I A U N I V E R S I T Y 2 0 1 4 What is a Signal? A physical quantity that varies with time, frequency, space, or any

More information

Stream Ciphers. Debdeep Mukhopadhyay

Stream Ciphers. Debdeep Mukhopadhyay Stream Ciphers Debdeep Mukhopadhyay Assistant Professor Department of Computer Science and Engineering Indian Institute of Technology Kharagpur INDIA -7232 Classifications Objectives Feedback Based Stream

More information

854 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I: REGULAR PAPERS, VOL. 62, NO. 3, MARCH 2015

854 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I: REGULAR PAPERS, VOL. 62, NO. 3, MARCH 2015 854 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I: REGULAR PAPERS, VOL. 62, NO. 3, MARCH 2015 Efficient Subquadratic Space Complexity Architectures Parallel MPB Single- and Double-Multiplications All Trinomials

More information

Randomness analysis of A5/1 Stream Cipher for secure mobile communication

Randomness analysis of A5/1 Stream Cipher for secure mobile communication Randomness analysis of A5/1 Stream Cipher for secure mobile communication Prof. Darshana Upadhyay 1, Dr. Priyanka Sharma 2, Prof.Sharada Valiveti 3 Department of Computer Science and Engineering Institute

More information

PA Substitution Cipher

PA Substitution Cipher Anuj Kumar 1 PA Substitution Cipher Ankur Kumar Varshney 2 Pankaj Kumar 3 1 M.Tech*, Computer Science & Engineering IEC CET, Greater Noida, (U.P.) India 2 M.Tech*, Computer Science & Engineering B.S.A

More information

WG Stream Cipher based Encryption Algorithm

WG Stream Cipher based Encryption Algorithm International Journal of Emerging Engineering Research and Technology Volume 3, Issue 11, November 2015, PP 63-70 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) WG Stream Cipher based Encryption Algorithm

More information

Logical Foundations of Mathematics and Computational Complexity a gentle introduction

Logical Foundations of Mathematics and Computational Complexity a gentle introduction Pavel Pudlák Logical Foundations of Mathematics and Computational Complexity a gentle introduction January 18, 2013 Springer i Preface As the title states, this book is about logic, foundations and complexity.

More information

Correlation to the Common Core State Standards

Correlation to the Common Core State Standards Correlation to the Common Core State Standards Go Math! 2011 Grade 4 Common Core is a trademark of the National Governors Association Center for Best Practices and the Council of Chief State School Officers.

More information

IMAGE AND TEXT COMPRESSION

IMAGE AND TEXT COMPRESSION IMAGE AND TEXT COMPRESSION THE KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE COMMUNICATIONS AND INFORMATION TIlEORY Other books in the series: Consulting Editor: Robert Gallager Digital

More information

This draft is superseded. Please refer to the updated version:

This draft is superseded. Please refer to the updated version: This draft is superseded. Please refer to the updated version: https://people.csail.mit.edu/jgross/personal-website/papers/2019-fiat-crypto-ieee-sp.pdf 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20

More information

Introduction To Modern Cryptography Jonathan Katz

Introduction To Modern Cryptography Jonathan Katz Introduction To Modern Cryptography Jonathan Katz Read Book Online: Introduction To Modern Cryptography Jonathan Katz Download or read online ebook introduction to modern cryptography jonathan katz in

More information

Analysis of Different Pseudo Noise Sequences

Analysis of Different Pseudo Noise Sequences Analysis of Different Pseudo Noise Sequences Alka Sawlikar, Manisha Sharma Abstract Pseudo noise (PN) sequences are widely used in digital communications and the theory involved has been treated extensively

More information

FORMAT OF Minor PROJECT REPORT

FORMAT OF Minor PROJECT REPORT FORMAT OF Minor PROJECT REPORT 1. Paper Size : A- 4 size bond paper 2. Margins : Top : 1 (1 inch=2.54cm) Bottom : 1.15 (2.86cm) Left : 1.5 Right : 0.6 3. Line Spacing: 1.5 line 4. Title of Chapter Font

More information

LUT Optimization for Memory Based Computation using Modified OMS Technique

LUT Optimization for Memory Based Computation using Modified OMS Technique LUT Optimization for Memory Based Computation using Modified OMS Technique Indrajit Shankar Acharya & Ruhan Bevi Dept. of ECE, SRM University, Chennai, India E-mail : indrajitac123@gmail.com, ruhanmady@yahoo.co.in

More information

New Address Shift Linear Feedback Shift Register Generator

New Address Shift Linear Feedback Shift Register Generator New Address Shift Linear Feedback Shift Register Generator Kholood J. Moulood Department of Mathematical, Tikrit University, College of Education for Women, Salahdin. E-mail: khmsc2006@yahoo.com. Abstract

More information

Cryptography Cryptography: General

Cryptography Cryptography: General Cryptography Cryptography: General [1] Alex Biryukov, Praveen Gauravaram, Jian Guo, Dmitry Khovratovich, San Ling, Krystian Matusiewicz, Ivica Nikolić, Josef Pieprzyk, and Huaxiong Wang, Cryptanalysis

More information

A Pseudorandom Binary Generator Based on Chaotic Linear Feedback Shift Register

A Pseudorandom Binary Generator Based on Chaotic Linear Feedback Shift Register A Pseudorandom Binary Generator Based on Chaotic Linear Feedback Shift Register Saad Muhi Falih Department of Computer Technical Engineering Islamic University College Al Najaf al Ashraf, Iraq saadmuheyfalh@gmail.com

More information

A Concise Introduction to Econometrics

A Concise Introduction to Econometrics A Concise Introduction to Econometrics In this short and very practical introduction to econometrics guides the reader through the essential concepts of econometrics. Central to the book are practical

More information

ALONG with the progressive device scaling, semiconductor

ALONG with the progressive device scaling, semiconductor IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II: EXPRESS BRIEFS, VOL. 57, NO. 4, APRIL 2010 285 LUT Optimization for Memory-Based Computation Pramod Kumar Meher, Senior Member, IEEE Abstract Recently, we

More information

Lecture 16: Feedback channel and source-channel separation

Lecture 16: Feedback channel and source-channel separation Lecture 16: Feedback channel and source-channel separation Feedback channel Source-channel separation theorem Dr. Yao Xie, ECE587, Information Theory, Duke University Feedback channel in wireless communication,

More information

Internet of Things: A Comprehensive Analysis and Security Implementation through Elliptic Curve Cryptography

Internet of Things: A Comprehensive Analysis and Security Implementation through Elliptic Curve Cryptography (Billions) International Journal of Current Engineering and Technology 2016 INPRESSCO, All Rights Reserved Research Article Internet of Things: A Comprehensive Analysis and Security Implementation through

More information

FORMAT OF SEMINAR REPORT

FORMAT OF SEMINAR REPORT FORMAT OF SEMINAR REPORT 1. Paper Size : A- 4 size bond paper 2. Margins : Top : 1 (1 inch=2.54cm) Bottom : 1.15 (2.86cm) Left : 1.5 Right : 0.6 3. Line Spacing: 1.5 line 4. Title of Chapter Font : Times

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY Tarannum Pathan,, 2013; Volume 1(8):655-662 INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK VLSI IMPLEMENTATION OF 8, 16 AND 32

More information

Implementation of High Speed Adder using DLATCH

Implementation of High Speed Adder using DLATCH International Journal of Emerging Engineering Research and Technology Volume 3, Issue 12, December 2015, PP 162-172 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) Implementation of High Speed Adder using

More information

Performance Evaluation of Stream Ciphers on Large Databases

Performance Evaluation of Stream Ciphers on Large Databases IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.9, September 28 285 Performance Evaluation of Stream Ciphers on Large Databases Dr.M.Sikandar Hayat Khiyal Aihab Khan Saria

More information

International Journal of Engineering Trends and Technology (IJETT) - Volume4 Issue8- August 2013

International Journal of Engineering Trends and Technology (IJETT) - Volume4 Issue8- August 2013 International Journal of Engineering Trends and Technology (IJETT) - Volume4 Issue8- August 2013 Design and Implementation of an Enhanced LUT System in Security Based Computation dama.dhanalakshmi 1, K.Annapurna

More information

Sequences and Cryptography

Sequences and Cryptography Sequences and Cryptography Workshop on Shift Register Sequences Honoring Dr. Solomon W. Golomb Recipient of the 2016 Benjamin Franklin Medal in Electrical Engineering Guang Gong Department of Electrical

More information

Implementation of Memory Based Multiplication Using Micro wind Software

Implementation of Memory Based Multiplication Using Micro wind Software Implementation of Memory Based Multiplication Using Micro wind Software U.Palani 1, M.Sujith 2,P.Pugazhendiran 3 1 IFET College of Engineering, Department of Information Technology, Villupuram 2,3 IFET

More information

ISSN (Print) Original Research Article. Coimbatore, Tamil Nadu, India

ISSN (Print) Original Research Article. Coimbatore, Tamil Nadu, India Scholars Journal of Engineering and Technology (SJET) Sch. J. Eng. Tech., 016; 4(1):1-5 Scholars Academic and Scientific Publisher (An International Publisher for Academic and Scientific Resources) www.saspublisher.com

More information

ELG7172A Multiresolution Signal Decomposition: Analysis & Applications. Eric Dubois ~edubois/courses/elg7172a

ELG7172A Multiresolution Signal Decomposition: Analysis & Applications. Eric Dubois   ~edubois/courses/elg7172a ELG7172A Multiresolution Signal Decomposition: Analysis & Applications edubois@uottawa.ca www.site.uottawa.ca/ ~edubois/courses/elg7172a Objectives of the Course Multiresolution signal analysis and processing

More information

LFSR Counter Implementation in CMOS VLSI

LFSR Counter Implementation in CMOS VLSI LFSR Counter Implementation in CMOS VLSI Doshi N. A., Dhobale S. B., and Kakade S. R. Abstract As chip manufacturing technology is suddenly on the threshold of major evaluation, which shrinks chip in size

More information

Cryptanalysis of the Bluetooth E 0 Cipher using OBDD s

Cryptanalysis of the Bluetooth E 0 Cipher using OBDD s Cryptanalysis of the Bluetooth E 0 Cipher using OBDD s Yaniv Shaked and Avishai Wool School of Electrical Engineering Systems, Tel Aviv University, Ramat Aviv 69978, ISRAEL shakedy@eng.tau.ac.il, yash@acm.org

More information

Memory efficient Distributed architecture LUT Design using Unified Architecture

Memory efficient Distributed architecture LUT Design using Unified Architecture Research Article Memory efficient Distributed architecture LUT Design using Unified Architecture Authors: 1 S.M.L.V.K. Durga, 2 N.S. Govind. Address for Correspondence: 1 M.Tech II Year, ECE Dept., ASR

More information

Adaptive decoding of convolutional codes

Adaptive decoding of convolutional codes Adv. Radio Sci., 5, 29 214, 27 www.adv-radio-sci.net/5/29/27/ Author(s) 27. This work is licensed under a Creative Commons License. Advances in Radio Science Adaptive decoding of convolutional codes K.

More information

c 2006 by CRC Press, LLC.

c 2006 by CRC Press, LLC. This contains the References of the Handbook of Elliptic and Hyperelliptic Curve Cryptography, Henri Cohen, Christophe Doche, and Gerhard Frey, Editors, CRC Press 2006. CRC Press has granted the following

More information

Library Assignment #2: Periodical Literature

Library Assignment #2: Periodical Literature Library Assignment #2: Periodical Literature Provide research summaries of ten papers on the history of mathematics (both words are crucial) that you have looked up and read. One purpose for doing this

More information

Implementation of 2-D Discrete Wavelet Transform using MATLAB and Xilinx System Generator

Implementation of 2-D Discrete Wavelet Transform using MATLAB and Xilinx System Generator Implementation of 2-D Discrete Wavelet Transform using MATLAB and Xilinx System Generator Syed Tajdar Naqvi Research Scholar,Department of Electronics & Communication, Institute of Engineering & Technology,

More information

OMS Based LUT Optimization

OMS Based LUT Optimization International Journal of Advanced Education and Research ISSN: 2455-5746, Impact Factor: RJIF 5.34 www.newresearchjournal.com/education Volume 1; Issue 5; May 2016; Page No. 11-15 OMS Based LUT Optimization

More information

DIFFERENTIATE SOMETHING AT THE VERY BEGINNING THE COURSE I'LL ADD YOU QUESTIONS USING THEM. BUT PARTICULAR QUESTIONS AS YOU'LL SEE

DIFFERENTIATE SOMETHING AT THE VERY BEGINNING THE COURSE I'LL ADD YOU QUESTIONS USING THEM. BUT PARTICULAR QUESTIONS AS YOU'LL SEE 1 MATH 16A LECTURE. OCTOBER 28, 2008. PROFESSOR: SO LET ME START WITH SOMETHING I'M SURE YOU ALL WANT TO HEAR ABOUT WHICH IS THE MIDTERM. THE NEXT MIDTERM. IT'S COMING UP, NOT THIS WEEK BUT THE NEXT WEEK.

More information

Music Source Separation

Music Source Separation Music Source Separation Hao-Wei Tseng Electrical and Engineering System University of Michigan Ann Arbor, Michigan Email: blakesen@umich.edu Abstract In popular music, a cover version or cover song, or

More information

Department of CSIT. Class: B.SC Semester: II Year: 2013 Paper Title: Introduction to logics of Computer Max Marks: 30

Department of CSIT. Class: B.SC Semester: II Year: 2013 Paper Title: Introduction to logics of Computer Max Marks: 30 Department of CSIT Class: B.SC Semester: II Year: 2013 Paper Title: Introduction to logics of Computer Max Marks: 30 Section A: (All 10 questions compulsory) 10X1=10 Very Short Answer Questions: Write

More information

How to Predict the Output of a Hardware Random Number Generator

How to Predict the Output of a Hardware Random Number Generator How to Predict the Output of a Hardware Random Number Generator Markus Dichtl Siemens AG, Corporate Technology Markus.Dichtl@siemens.com Abstract. A hardware random number generator was described at CHES

More information

1/ 19 2/17 3/23 4/23 5/18 Total/100. Please do not write in the spaces above.

1/ 19 2/17 3/23 4/23 5/18 Total/100. Please do not write in the spaces above. 1/ 19 2/17 3/23 4/23 5/18 Total/100 Please do not write in the spaces above. Directions: You have 50 minutes in which to complete this exam. Please make sure that you read through this entire exam before

More information

Implementation of Low Power and Area Efficient Carry Select Adder

Implementation of Low Power and Area Efficient Carry Select Adder International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 3 Issue 8 ǁ August 2014 ǁ PP.36-48 Implementation of Low Power and Area Efficient Carry Select

More information

Robust Key Exchange Protocol between Set-Top Box and Smart Card in DTV Broadcasting

Robust Key Exchange Protocol between Set-Top Box and Smart Card in DTV Broadcasting INFORMATICA, 2009, Vol. 20, No. 1, 139 150 139 2009 Institute of Mathematics and Informatics, Vilnius Robust Key Exchange Protocol between Set-Top Box and Smart Card in DTV Broadcasting Eun-Jun YOON School

More information

Key-based scrambling for secure image communication

Key-based scrambling for secure image communication University of Wollongong Research Online Faculty of Engineering and Information Sciences - Papers: Part A Faculty of Engineering and Information Sciences 2012 Key-based scrambling for secure image communication

More information

Elementary Number Theory (Textbooks In Mathematics) By James S. Kraft READ ONLINE

Elementary Number Theory (Textbooks In Mathematics) By James S. Kraft READ ONLINE Elementary Number Theory (Textbooks In Mathematics) By James S. Kraft READ ONLINE 10 Mathematics - Undergraduate Textbooks Number Theory with Cryptography James S. Kraft Textbooks Linear Algebra Elementary

More information

SRAM Based Random Number Generator For Non-Repeating Pattern Generation

SRAM Based Random Number Generator For Non-Repeating Pattern Generation Applied Mechanics and Materials Online: 2014-06-18 ISSN: 1662-7482, Vol. 573, pp 181-186 doi:10.4028/www.scientific.net/amm.573.181 2014 Trans Tech Publications, Switzerland SRAM Based Random Number Generator

More information

Design of Memory Based Implementation Using LUT Multiplier

Design of Memory Based Implementation Using LUT Multiplier Design of Memory Based Implementation Using LUT Multiplier Charan Kumar.k 1, S. Vikrama Narasimha Reddy 2, Neelima Koppala 3 1,2 M.Tech(VLSI) Student, 3 Assistant Professor, ECE Department, Sree Vidyanikethan

More information

Modified Alternating Step Generators with Non-Linear Scrambler

Modified Alternating Step Generators with Non-Linear Scrambler Modified Alternating Step Generators with Non-Linear Scrambler Robert Wicik, Tomasz Rachwalik, Rafał Gliwa Military Communication Institute, Cryptology Department, Zegrze, Poland {r.wicik, t.rachwalik,

More information

Enhancing Performance in Multiple Execution Unit Architecture using Tomasulo Algorithm

Enhancing Performance in Multiple Execution Unit Architecture using Tomasulo Algorithm Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,

More information

Example: compressing black and white images 2 Say we are trying to compress an image of black and white pixels: CSC310 Information Theory.

Example: compressing black and white images 2 Say we are trying to compress an image of black and white pixels: CSC310 Information Theory. CSC310 Information Theory Lecture 1: Basics of Information Theory September 11, 2006 Sam Roweis Example: compressing black and white images 2 Say we are trying to compress an image of black and white pixels:

More information

Design of Carry Select Adder using Binary to Excess-3 Converter in VHDL

Design of Carry Select Adder using Binary to Excess-3 Converter in VHDL Journal From the SelectedWorks of Kirat Pal Singh Summer May 18, 2016 Design of Carry Select Adder using Binary to Excess-3 Converter in VHDL Brijesh Kumar, Vaagdevi college of engg. Pune, Andra Pradesh,

More information

Multiple Image Secret Sharing based on Linear System

Multiple Image Secret Sharing based on Linear System Indian Journal of Science and Technology, Vol 10(33), 10.17485/ijst/2017/v10i33/113085, September 2017 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Multiple Image Secret Sharing based on Linear System

More information

Modified Reconfigurable Fir Filter Design Using Look up Table

Modified Reconfigurable Fir Filter Design Using Look up Table Modified Reconfigurable Fir Filter Design Using Look up Table R. Dhayabarani, Assistant Professor. M. Poovitha, PG scholar, V.S.B Engineering College, Karur, Tamil Nadu. Abstract - Memory based structures

More information

A Colorimetric Study of Spatial Uniformity in Projection Displays

A Colorimetric Study of Spatial Uniformity in Projection Displays A Colorimetric Study of Spatial Uniformity in Projection Displays Jean-Baptiste Thomas 1,2 and Arne Magnus Bakke 1 1 Gjøvik University College, The Norwegian Color Research Laboratory 2 Université de Bourgogne,

More information

1 Lesson 11: Antiderivatives of Elementary Functions

1 Lesson 11: Antiderivatives of Elementary Functions 1 Lesson 11: Antiderivatives of Elementary Functions Chapter 6 Material: pages 237-252 in the textbook: The material in this lesson covers The definition of the antiderivative of a function of one variable.

More information

Welch Gong (Wg) 128 Bit Stream Cipher For Encryption and Decryption Algorithm

Welch Gong (Wg) 128 Bit Stream Cipher For Encryption and Decryption Algorithm International Journal of Emerging Engineering Research and Technology Volume 3, Issue 8, August 2015, PP 137-144 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) Welch Gong (Wg) 128 Bit Stream Cipher For

More information

Segmented Leap-Ahead LFSR Architecture for Uniform Random Number Generator

Segmented Leap-Ahead LFSR Architecture for Uniform Random Number Generator , pp.233-242 http://dx.doi.org/10.14257/ijseia.2013.7.5.21 Segmented Leap-Ahead LFSR Architecture for Uniform Random Number Generator Je-Hoon Lee 1 and Seong Kun Kim 2 1 Div. of Electronics, Information

More information

Reconfigurable Universal Fuzzy Flip-Flop: Applications to Neuro-Fuzzy Systems

Reconfigurable Universal Fuzzy Flip-Flop: Applications to Neuro-Fuzzy Systems Reconfigurable Universal Fuzzy Flip-Flop: Applications to Neuro-Fuzzy Systems Essam A. Koshak Problem Report submitted to the Statler College of Engineering and Mineral Resources at West Virginia University

More information

FORMAL GROUPS AND APPLICATIONS MICHIEL HAZEWINKEL AMS CHELSEA PUBLISHING

FORMAL GROUPS AND APPLICATIONS MICHIEL HAZEWINKEL AMS CHELSEA PUBLISHING FORMAL GROUPS AND APPLICATIONS MICHIEL HAZEWINKEL AMS CHELSEA PUBLISHING FORMAL GROUPS AND APPLICATIONS http://dx.doi.org/10.1090/chel/375.h FORMAL GROUPS AND APPLICATIONS MICHIEL HAZEWINKEL AMS CHELSEA

More information

DESIGN and IMPLETATION of KEYSTREAM GENERATOR with IMPROVED SECURITY

DESIGN and IMPLETATION of KEYSTREAM GENERATOR with IMPROVED SECURITY DESIGN and IMPLETATION of KEYSTREAM GENERATOR with IMPROVED SECURITY Vijay Shankar Pendluri, Pankaj Gupta Wipro Technologies India vijay_shankarece@yahoo.com, pankaj_gupta96@yahoo.com Abstract - This paper

More information

Differential Geometry of Manifolds

Differential Geometry of Manifolds Differential Geometry of Manifolds Quddus Khan Click here if your download doesn"t start automatically Differential Geometry of Manifolds Quddus Khan Differential Geometry of Manifolds Quddus Khan Curves

More information

Piya Pal. California Institute of Technology, Pasadena, CA GPA: 4.2/4.0 Advisor: Prof. P. P. Vaidyanathan

Piya Pal. California Institute of Technology, Pasadena, CA GPA: 4.2/4.0 Advisor: Prof. P. P. Vaidyanathan Piya Pal 1200 E. California Blvd MC 136-93 Pasadena, CA 91125 Tel: 626-379-0118 E-mail: piyapal@caltech.edu http://www.systems.caltech.edu/~piyapal/ Education Ph.D. in Electrical Engineering Sep. 2007

More information

Implementation and performance analysis of convolution error correcting codes with code rate=1/2.

Implementation and performance analysis of convolution error correcting codes with code rate=1/2. 2016 International Conference on Micro-Electronics and Telecommunication Engineering Implementation and performance analysis of convolution error correcting codes with code rate=1/2. Neha Faculty of engineering

More information

James Stewart Single Variable Calculus 7th Edition Pdf

James Stewart Single Variable Calculus 7th Edition Pdf James Stewart Single Variable Calculus 7th Edition Pdf Read Book Online: James Stewart Single Variable Calculus 7th Edition Pdf Download or read online ebook james stewart single variable calculus 7th

More information

FPGA IMPEMENTATION OF LOW POWER AND AREA EFFICIENT CARRY SELECT ADDER

FPGA IMPEMENTATION OF LOW POWER AND AREA EFFICIENT CARRY SELECT ADDER FPGA IMPEMENTATION OF LOW POWER AND AREA EFFICIENT CARRY SELECT ADDER A.Nithya [3],A.G.Priyanka [3],B.Ajitha [3],D.Gracia Nirmala Rani [2],S.Rajaram [1] [1]- Associate Professor, [2]- Assistant Professor,

More information

LUT Design Using OMS Technique for Memory Based Realization of FIR Filter

LUT Design Using OMS Technique for Memory Based Realization of FIR Filter International Journal of Emerging Engineering Research and Technology Volume. 2, Issue 6, September 2014, PP 72-80 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) LUT Design Using OMS Technique for Memory

More information

Communication Avoiding Successive Band Reduction

Communication Avoiding Successive Band Reduction Communication Avoiding Successive Band Reduction Grey Ballard, James Demmel, Nicholas Knight UC Berkeley PPoPP 12 Research supported by Microsoft (Award #024263) and Intel (Award #024894) funding and by

More information

Study of White Gaussian Noise with Varying Signal to Noise Ratio in Speech Signal using Wavelet

Study of White Gaussian Noise with Varying Signal to Noise Ratio in Speech Signal using Wavelet American International Journal of Research in Science, Technology, Engineering & Mathematics Available online at http://www.iasir.net ISSN (Print): 2328-3491, ISSN (Online): 2328-3580, ISSN (CD-ROM): 2328-3629

More information

DIGITAL SYSTEM DESIGN UNIT I (2 MARKS)

DIGITAL SYSTEM DESIGN UNIT I (2 MARKS) DIGITAL SYSTEM DESIGN UNIT I (2 MARKS) 1. Convert Binary number (111101100) 2 to Octal equivalent. 2. Convert Binary (1101100010011011) 2 to Hexadecimal equivalent. 3. Simplify the following Boolean function

More information

A Hardware Oriented Method to Generate and Evaluate Nonlinear Interleaved Sequences with Desired properties

A Hardware Oriented Method to Generate and Evaluate Nonlinear Interleaved Sequences with Desired properties A Hardware Oriented Method to Generate and Evaluate Nonlinear Interleaved Sequences with Desired properties Quynh Le Chi 1 Cuong Nguyen Le 2 Thang Pham Xuan 2 1. Van Lang University, 45 Tran Khac Nhu,

More information

ECE 301 Digital Electronics

ECE 301 Digital Electronics ECE 301 Digital Electronics Derivation of Flip-Flop Input Equations and State Assignment (Lecture #24) The slides included herein were taken from the materials accompanying Fundamentals of Logic Design,

More information

Logic Design II (17.342) Spring Lecture Outline

Logic Design II (17.342) Spring Lecture Outline Logic Design II (17.342) Spring 2012 Lecture Outline Class # 05 February 23, 2012 Dohn Bowden 1 Today s Lecture Analysis of Clocked Sequential Circuits Chapter 13 2 Course Admin 3 Administrative Admin

More information

Appendix A Types of Recorded Chords

Appendix A Types of Recorded Chords Appendix A Types of Recorded Chords In this appendix, detailed lists of the types of recorded chords are presented. These lists include: The conventional name of the chord [13, 15]. The intervals between

More information

Architecture of Discrete Wavelet Transform Processor for Image Compression

Architecture of Discrete Wavelet Transform Processor for Image Compression Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 6, June 2013, pg.41

More information

Microprocessor Design

Microprocessor Design Microprocessor Design Principles and Practices With VHDL Enoch O. Hwang Brooks / Cole 2004 To my wife and children Windy, Jonathan and Michelle Contents 1. Designing a Microprocessor... 2 1.1 Overview

More information

Lecture 1: Introduction to Digital Logic Design. CK Cheng CSE Dept. UC San Diego

Lecture 1: Introduction to Digital Logic Design. CK Cheng CSE Dept. UC San Diego Lecture 1: Introduction to Digital Logic Design CK Cheng CSE Dept. UC San Diego 1 Outlines Administration Motivation Scope 2 Administration Web site: http://www.cse.ucsd.edu/classes/fa12/cse140-a/ WebCT:

More information

HYBRID CONCATENATED CONVOLUTIONAL CODES FOR DEEP SPACE MISSION

HYBRID CONCATENATED CONVOLUTIONAL CODES FOR DEEP SPACE MISSION HYBRID CONCATENATED CONVOLUTIONAL CODES FOR DEEP SPACE MISSION Presented by Dr.DEEPAK MISHRA OSPD/ODCG/SNPA Objective :To find out suitable channel codec for future deep space mission. Outline: Interleaver

More information

Heart Rate Variability Preparing Data for Analysis Using AcqKnowledge

Heart Rate Variability Preparing Data for Analysis Using AcqKnowledge APPLICATION NOTE 42 Aero Camino, Goleta, CA 93117 Tel (805) 685-0066 Fax (805) 685-0067 info@biopac.com www.biopac.com 01.06.2016 Application Note 233 Heart Rate Variability Preparing Data for Analysis

More information

год переплёт Цена, в руб., с НДС Дисциплина Поддисциплина Тип издания Software Engineering/Programming and Operating Systems

год переплёт Цена, в руб., с НДС Дисциплина Поддисциплина Тип издания Software Engineering/Programming and Operating Systems -цена книги включает в себя доставку до нашего склада в Москве; -стоимость доставки рассчитывается отдельно; ISBN Автор Название 1 2 3 4 5 6 7 8 9 10 11 12 13 14 84857-0 31073-2 84996-720-4 04100-6 84800-069-8

More information

UNIVERSITY OF MASSACHUSSETS LOWELL Department of Electrical & Computer Engineering Course Syllabus for Logic Design Fall 2013

UNIVERSITY OF MASSACHUSSETS LOWELL Department of Electrical & Computer Engineering Course Syllabus for Logic Design Fall 2013 UNIVERSITY OF MASSACHUSSETS LOWELL Department of Electrical & Computer Engineering Course Syllabus for 16.265 Logic Design Fall 2013 I. General Information Section 201 Instructor: Professor Anh Tran Office

More information

FPGA Implementation of Low Power and Area Efficient Carry Select Adder

FPGA Implementation of Low Power and Area Efficient Carry Select Adder Journal From the SelectedWorks of Kirat Pal Singh Summer July 17, 2014 FPGA Implementation of Low Power and Area Efficient Carry Select Adder A. Nithya, Thiagarajar College of Engineering, Madurai, India

More information

Steganographic Technique for Hiding Secret Audio in an Image

Steganographic Technique for Hiding Secret Audio in an Image Steganographic Technique for Hiding Secret Audio in an Image 1 Aiswarya T, 2 Mansi Shah, 3 Aishwarya Talekar, 4 Pallavi Raut 1,2,3 UG Student, 4 Assistant Professor, 1,2,3,4 St John of Engineering & Management,

More information

Journey through Mathematics

Journey through Mathematics Journey through Mathematics Enrique A. González-Velasco Journey through Mathematics Creative Episodes in Its History Enrique A. González-Velasco Department of Mathematical Sciences University of Massachusetts

More information

A Delay-based PUF Design Using Multiplexer Chains

A Delay-based PUF Design Using Multiplexer Chains A Delay-based PUF Design Using Multiplexer Chains Miaoqing Huang and Shiming Li Department of Computer Science and Computer Engineering University of Arkansas Fayetteville, AR 727, USA Email: {mqhuang,

More information

Introduction to Digital Logic Missouri S&T University CPE 2210 Exam 3 Logistics

Introduction to Digital Logic Missouri S&T University CPE 2210 Exam 3 Logistics Introduction to Digital Logic Missouri S&T University CPE 2210 Exam 3 Logistics Egemen K. Çetinkaya Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of Science and

More information

Implementation and Analysis of Area Efficient Architectures for CSLA by using CLA

Implementation and Analysis of Area Efficient Architectures for CSLA by using CLA Volume-6, Issue-3, May-June 2016 International Journal of Engineering and Management Research Page Number: 753-757 Implementation and Analysis of Area Efficient Architectures for CSLA by using CLA Anshu

More information

Restricted super line signed graph RL r (S)

Restricted super line signed graph RL r (S) Notes on Number Theory and Discrete Mathematics Vol. 19, 2013, No. 4, 86 92 Restricted super line signed graph RL r (S) P. Siva Kota Reddy 1 and U. K. Misra 2 1 Department of Mathematics Siddaganga Institute

More information

Book: Fundamentals of Music Processing. Audio Features. Book: Fundamentals of Music Processing. Book: Fundamentals of Music Processing

Book: Fundamentals of Music Processing. Audio Features. Book: Fundamentals of Music Processing. Book: Fundamentals of Music Processing Book: Fundamentals of Music Processing Lecture Music Processing Audio Features Meinard Müller International Audio Laboratories Erlangen meinard.mueller@audiolabs-erlangen.de Meinard Müller Fundamentals

More information

Prime Num Generator - Maker Faire 2014

Prime Num Generator - Maker Faire 2014 Prime Num Generator - Maker Faire 2014 Experimenting with math in hardware Stanley Ng, Altera Synopsis The Prime Number Generator ( PNG ) counts from 1 to some number (273 million, on a Cyclone V C5 device)

More information

[Dharani*, 4.(8): August, 2015] ISSN: (I2OR), Publication Impact Factor: 3.785

[Dharani*, 4.(8): August, 2015] ISSN: (I2OR), Publication Impact Factor: 3.785 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY IMPLEMENTATION OF ADDRESS GENERATOR FOR WiMAX DEINTERLEAVER ON FPGA T. Dharani*, C.Manikanta * M. Tech scholar in VLSI System

More information