Academic literature on the topic 'Crypto Processor'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Crypto Processor.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Crypto Processor"

1

Rashid, Muhammad, Sajjad Shaukat Jamal, Sikandar Zulqarnain Khan, Adel R. Alharbi, Amer Aljaedi, and Malik Imran. "Elliptic-Curve Crypto Processor for RFID Applications." Applied Sciences 11, no. 15 (July 31, 2021): 7079. http://dx.doi.org/10.3390/app11157079.

Full text
Abstract:
This work presents an Elliptic-curve Point Multiplication (ECP) architecture with a focus on low latency and low area for radio-frequency-identification (RFID) applications over GF(2163). To achieve low latency, we have reduced the clock cycles by using: (i) three-shift buffers in the datapath to load Elliptic-curve parameters as well as an initial point, (ii) the identical size of input/output interfaces in all building blocks of the architecture. The low area is preserved by using the same hardware resources of squaring and multiplication for inversion computation. Finally, an efficient controller is used to control the inferred logic. The proposed ECP architecture is modeled in Verilog and the synthesis results are given on three different 7-series FPGA (Field Programmable Gate Array) devices, i.e., Kintex-7, Artix-7, and Virtex-7. The performance of the architecture is provided with the integration of a schoolbook multiplier (implemented with two different logic styles, i.e., combinational and sequential). On Kintex-7, the combinational implementation style of a schoolbook multiplier results in power-optimized, i.e., 161 μW, values with an expense of (i) hardware resources, i.e., 3561 look-up-tables and 1527 flip-flops, (ii) clock frequency, i.e., 227 MHz, and (iii) latency, i.e., 11.57 μs. On the same Kintex-7 device, the sequential implementation style of a schoolbook multiplier provides, (i) 2.88 μs latency, (ii) 1786 look-up-tables and 1855 flip-flops, (iii) 647 μW power, and (iv) 909 MHz clock frequency. Therefore, the reported area, latency and power results make the proposed ECP architecture well-suited for RFID applications.
APA, Harvard, Vancouver, ISO, and other styles
2

Cho, Wook-Lae, Ki-Bbeum Kim, Gi-Chur Bae, and Kyung-Wook Shin. "A Crypto-processor Supporting Multiple Block Cipher Algorithms." Journal of the Korea Institute of Information and Communication Engineering 20, no. 11 (November 30, 2016): 2093–99. http://dx.doi.org/10.6109/jkiice.2016.20.11.2093.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Somani, Turki F. Al, M. K. Ibrahim, and Adnan Gutub. "High Performance Elliptic Curve GF(2m) Crypto-processor." Information Technology Journal 5, no. 4 (June 15, 2006): 742–48. http://dx.doi.org/10.3923/itj.2006.742.748.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Saad, Mahaba, Khalid Youssef, Mohamed Tarek, and Hala Abdel-Kader. "Architecture of ASIP Crypto-Processor for Dynamic Runtime Security Applications." Indonesian Journal of Electrical Engineering and Computer Science 4, no. 2 (November 1, 2016): 412. http://dx.doi.org/10.11591/ijeecs.v4.i2.pp412-423.

Full text
Abstract:
<p>Nowadays, demands of data security are increasing, especially after introduction of wireless communications to the masses. Cryptographic algorithms are mainly used to obtain confidentiality and integrity of data in communication. There are a variety of encryption algorithms have been developed. This paper provides quantitative analysis and comparison of some symmetric key cryptographic ciphers (DES, 3DES, AES, Blowfish, RC5, and RC6). The quantitative analysis approach is a step towards optimizing the security operations for an efficient next generation family of network processors with enhanced speed and power performance. A framework will be proposed as a reference model for quantitative analysis of security algorithm mathematical and logical operations. This paper also provides a dynamic crypto processor used for selected symmetric key cryptographic ciphers and provides an implementation of 16bit cryptographic processor that performs logical operations and arithmetic operations like rotate shift left, modular addition 2^16, S_box operation, and key expansion operation on spartan6 lower power, xc6slx150L-1lfgg676 FPGA. Simulation results show that developed processor working with high Speed, low power, and low delay time. </p>
APA, Harvard, Vancouver, ISO, and other styles
5

Ahmadi, Hamid Reza, Ali Afzali-Kusha, and Massoud Pedram. "A power-optimized low-energy elliptic-curve crypto-processor." IEICE Electronics Express 7, no. 23 (2010): 1752–59. http://dx.doi.org/10.1587/elex.7.1752.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bouesse, Fraidy, M. Renaudin, and Fabien Germain. "Asynchronous AES Crypto-Processor Including Secured and Optimized Blocks." Journal of Integrated Circuits and Systems 1, no. 1 (November 16, 2004): 5–13. http://dx.doi.org/10.29292/jics.v1i1.249.

Full text
Abstract:
This paper presents the first study of an asynchronous AES architecture compliant with the NIST standard. It exploits the fundamental properties of quasi delay insensitive asynchronous circuits. First, 1 to N encoding is extensively used in order to minimize hardware cost, thus optimizing area and speed. Most importantly, it is shown how the quasi delay insensitive logic style gives the opportunity to design balanced architectures, particularly well suited to improve differential power analysis resistance. Indeed, the proposed design methodology enables the generation of logic circuits which always involve a constant number of logical transitions, independently of data values processed by the circuit. Based on a 32-bit data-path, a balanced and optimized QDI asynchronous architecture of the AES is described. In addition, several architecture trade-offs are considered, and their area and speed estimated. Simulation results show that with the proposed design approach, throughputs ranging from 36 Mbit/s to more than 569 Mbit/s can be achieved, well suited to target smart-card applications.
APA, Harvard, Vancouver, ISO, and other styles
7

Machhout, Mohsen, Zied Guitouni, Kholdoun Torki, and Lazhar Khriji. "Coupled FPGA/ASIC Implementation of Elliptic Curve Crypto-Processor." International journal of Network Security & Its Applications 2, no. 2 (April 25, 2010): 100–112. http://dx.doi.org/10.5121/ijnsa.2010.2208.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Imran, Malik, Muhammad Rashid, Atif Raza Jafri, and Muhammad Najam-ul-Islam. "ACryp-Proc: Flexible Asymmetric Crypto Processor for Point Multiplication." IEEE Access 6 (2018): 22778–93. http://dx.doi.org/10.1109/access.2018.2828319.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Huang, Hai, Bin Yu, Zhiwei Liu, Rui Weng, Junfeng Gao, and Mingyuan Ren. "DPA countermeasures for reconfigurable crypto processor using non-deterministic execution." IEICE Electronics Express 15, no. 24 (2018): 20180987. http://dx.doi.org/10.1587/elex.15.20180987.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Qin, Xiaotie. "Software Architecture for IPSec Crypto Offload Based on Security Processor." Open Automation and Control Systems Journal 6, no. 1 (December 31, 2014): 952–58. http://dx.doi.org/10.2174/1874444301406010952.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Crypto Processor"

1

Gaspar, Lubos. "Crypto-processor - architecture, programming and evaluation of the security." Phd thesis, Université Jean Monnet - Saint-Etienne, 2012. http://tel.archives-ouvertes.fr/tel-00978472.

Full text
Abstract:
Architectures of cryptographic processors and coprocessors are often vulnerable to different kinds of attacks, especially those targeting the disclosure of encryption keys. It is well known that manipulating confidential keys by the processor as ordinary data can represent a threat: a change in the program code (malicious or unintentional) can cause the unencrypted confidential key to leave the security area. This way, the security of the whole system would be irrecoverably compromised. The aim of our work was to search for flexible and reconfigurable hardware architectures, which can provide high security of confidential keys during their generation, storage and exchange while implementing common symmetric key cryptographic modes and protocols. In the first part of the manuscript, we introduce the bases of applied cryptography and of reconfigurable computing that are necessary for better understanding of the work. Second, we present threats to security of confidential keys when stored and processed within an embedded system. To counteract these threats, novel design rules increasing robustness of cryptographic processors and coprocessors against software attacks are presented. The rules suggest separating registers dedicated to key storage from those dedicated to data storage: we propose to partition the system into the data, cipher and key zone and to isolate the zones from each other at protocol, system, architectural and physical levels. Next, we present a novel HCrypt crypto-processor complying with the separation rules and thus ensuring secure key management. Besides instructions dedicated to secure key management, some additional instructions are dedicated to easy realization of block cipher modes and cryptographic protocols in general. In the next part of the manuscript, we show that the proposed separation principles can be extended also to a processor-coprocessor architecture. We propose a secure crypto-coprocessor, which can be used in conjunction with any general-purpose processor. To demonstrate its flexibility, the crypto-coprocessor is interconnected with the NIOS II, MicroBlaze and Cortex M1 soft-core processors. In the following part of the work, we examine the resistance of the HCrypt cryptoprocessor to differential power analysis (DPA) attacks. Following this analysis, we modify the architecture of the HCrypt processor in order to simplify its protection against side channel attacks (SCA) and fault injection attacks (FIA). We show that by rearranging blocks of the HCrypt processor at macroarchitecture level, the new HCrypt2 processor becomes natively more robust to DPA and FIA. Next, we study possibilities of dynamically reconfiguring selected parts of the processor - crypto-coprocessor architecture. The dynamic reconfiguration feature can be very useful when the cipher algorithm or its implementation must be changed in response to appearance of some vulnerability. Finally, the last part of the manuscript is dedicated to thorough testing and optimizations of both versions of the HCrypt crypto-processor. Architectures of crypto-processors and crypto-coprocessors are often vulnerable to software attacks targeting the disclosure of encryption keys. The thesis introduces separation rules enabling crypto-processor/coprocessors to support secure key management. Separation rules are implemented on novel HCrypt crypto-processor resistant to software attacks targetting the disclosure of encryption keys
APA, Harvard, Vancouver, ISO, and other styles
2

Sbiaa, Fatma. "Modélisation et analyse de la sécurité au niveau système des primitives cryptographique." Thesis, Lorient, 2016. http://www.theses.fr/2016LORIS410.

Full text
Abstract:
Le présent travail porte sur la modélisation et l’implémentation un crypto-processeur reconfigurable capable de garantir le niveau de sécurité exigé. L’étude de la résistance du crypto-système étudié aux différents types d’attaques (statistiques, linéaires et différentielles) peut nous mettre sur la trace de possibles failles, d’en extraire les points faibles et de proposer les contres mesures adéquates. C’est ainsi qu’on a pu proposer des approches de correction afin d’améliorer la robustesse de l’algorithme de cryptage symétrique par blocs. Pour cet effet, on a proposé un flot de conception optimisé pour la modélisation, la vérification et la correction des primitives cryptographiques. Mais la contribution majeure du présent travail fût l’exploitation des propriétés de la théorie de chaos. Pour la conception du crypto-processeur proposé, on a fait appel aux avantages de la modélisation à haut niveau. On a proposé d'utiliser les deux niveaux d'abstraction CABA et TLM. L’utilisation simultanée de ces deux niveaux est possible par le biais du niveau ESL, ce qui garantit de minimiser d’une part l’effort permettant de spécifier les fonctionnalités demandées et d’autre part de négliger les détails inutiles au niveau haut de la conception
Regarding the increasing complexity of cryptographic devices, testing their security level against existing attacks requires a fast simulation environment. The Advanced Encryption Standard (AES) is widely used in embedded systems in order to secure the sensitive data. Still, some issues lie in the used key and the S-BOX. The present work presents a SystemC implementation of a chaos-based crypto-processor for the AES algorithm.The design of the proposed architecture is studied using the SystemC tools. The proposed correction approach exploits the chaos theory properties to cope with the defaulting parameters of the AES algorithm. Detailed experimental results are given in order to evaluate the security level and the performance criteria. In fact, the proposed crypto- system presents numerous interesting features, including a high security level, a pixel distributing uniformity, a sufficiently large key-space with improved key sensitivity, and acceptable speed
APA, Harvard, Vancouver, ISO, and other styles
3

Buchty, Rainer. "Cryptonite a programmable crypto processor architecture for high bandwidth applications /." [S.l. : s.n.], 2002. http://deposit.ddb.de/cgi-bin/dokserv?idn=966328108.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Egemen, Tufan. "Design And Systemc Implementation Of A Crypto Processor For Aes And Des Algorithms." Master's thesis, METU, 2007. http://etd.lib.metu.edu.tr/upload/12609110/index.pdf.

Full text
Abstract:
This thesis study presents design and SystemC implementation of a Crypto Processor for Advanced Encryption Standard (AES), Data Encryption Standard (DES) and Triple DES (TDES) algorithms. All of the algorithms are implemented in single architecture instead of using separate architectures for each of the algorithm. There is an Instruction Set Architecture (ISA) implemented for this Crypto Processor and the encryption and decryption of algorithms can be performed by using the proper instructions in the ISA. A permutation module is added to perform bit permutation operations, in addition to some basic structures of general purpose micro processors. Also the Arithmetic Logic Unit (ALU) structure is modified to process some crypto algorithm-specific operations. The design of the proposed architecture is studied using SystemC. The architecture is implemented in modules by using the advantages of SystemC in modular structures. The simulation results from SystemC are analyzed to verify the proposed design. The instruction sets to implement the crypto algorithms are presented and a detailed hardware synthesis study has been carried out using the tool called SystemCrafter.
APA, Harvard, Vancouver, ISO, and other styles
5

Kannavara, Raghudeep. "DESIGN AND PERFORMANCE ANALYSIS OF A SECURE PROCES-SOR SCAN-SP WITH CRYPTO-BIOMETRIC CAPABILITIES." Wright State University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=wright1254532768.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Góes, Priscilla da Silva. "A perseguição inquisitorial e o criptojudaísmo : estudo dos processos envolvendo o sargento-mor Diogo Vaz e seus familiares (1662-1673)." Pós-Graduação em Ciências da Religião, 2017. http://ri.ufs.br/jspui/handle/123456789/6666.

Full text
Abstract:
Fundação de Apoio a Pesquisa e à Inovação Tecnológica do Estado de Sergipe - FAPITEC/SE
The present dissertation, entitled "Inquisitorial persecution and Crypto-Judaism: A study of the processes involving the sergeant-general Diogo Vaz and his relatives (1662-1673)", has as a research object the description and analysis of the Inquisition, specifically in the persecution of New Christians accused of Judaizers in the Iberian Peninsula, as well as in the Colony. We sought to investigate the cases of Diogo Vaz Penalvo, his sister Anna Rodrigues and other members of his family. For this, we are based on the categories of the Ginzburg (2001) index of the microhistory studied by Giovanni Levi (1992) and Ginzburg (2006), the category of pariah explained by Weber (2010) and the sociology of secrecy, of Simmel (2009), of fundamental importance for the maintenance of Crypto-Judaism. From this, we follow the following steps: to reconstruct the steps of members of a family arrested by the Holy Office and compare them with other cases already studied, collaborating with the study of religious practices that resisted Catholicism in the colonial period; to find in the reports of the documents indications of religious practices considered deviant from the Catholic faith. Finally, this research aims to contribute to the study of the inquisition with a focus on the persecution of the Crypto-Jews, in an attempt to know the religious practices of a family that suffered for more than a decade humiliation, exile and fire.
A presente dissertação, intitulada “A perseguição inquisitorial e o Criptojudaísmo: Estudo dos processos envolvendo o sargento-mor Diogo Vaz e seus familiares (1662-1673)”, tem como objeto de pesquisa a descrição e análise da Inquisição, especificamente na perseguição aos cristãos-novos acusados de judaizantes na Península Ibérica, assim como na Colônia. Buscamos investigar os casos de Diogo Vaz Penalvo, de sua irmã Anna Rodrigues e de outros membros da sua família. Para tal, baseamo-nos nas categorias do paradigma indiciário de Ginzburg (2001), da micro-história estudada por Giovanni Levi (1992) e Ginzburg (2006), a categoria de pária explicada por Weber (2010) e a sociologia do segredo, de Simmel (2009), de fundamental importância para a manutenção do criptojudaísmo. A partir disso, seguimos os seguintes caminhos: reconstruir os passos de membros de uma família presa pelo Santo Ofício e compará-los com outros casos já estudados, colaborando com o estudo de práticas religiosas que resistiram ao catolicismo no período colonial; encontrar nos relatos dos documentos indícios de práticas religiosas consideradas desviantes da fé católica. Por fim, esta pesquisa visa contribuir para o estudo do tema da inquisição com o foco na perseguição aos criptojudeus, na tentativa de conhecer as práticas religiosas de uma família que sofreu durante mais de uma década a humilhação, o degredo, a tomada de bens e o fogo.
São Cristóvão, SE
APA, Harvard, Vancouver, ISO, and other styles
7

Zeng, Chenxi. "A minimum cost and risk mitigation approach for blood collection." Diss., Georgia Institute of Technology, 2016. http://hdl.handle.net/1853/54966.

Full text
Abstract:
Due to the limited supply and perishable nature of blood products, effective management of blood collection is critical for high quality healthcare delivery. Whole blood is typically collected over a 6 to 8 hour collection window from volunteer donors at sites, e.g., schools, universities, churches, companies, that are a significant distance from the blood products processing facility and then transported from collection site to processing facility by a blood mobile. The length of time between collecting whole blood and processing it into cryoprecipitate ("cryo"), a critical blood product for controlling massive hemorrhaging, cannot take longer than 8 hours (the 8 hour collection to completion constraint), while the collection to completion constraint for other blood products is 24 hours. In order to meet the collection to completion constraint for cryo, it is often necessary to have a "mid-drive collection"; i.e., for a vehicle other than the blood mobile to pickup and transport, at extra cost, whole blood units collected during early in the collection window to the processing facility. In this dissertation, we develop analytical models to: (1) analyze which collection sites should be designated as cryo collection sites to minimize total collection costs while satisfying the collection to completion constraint and meeting the weekly production target (the non-split case), (2) analyze the impact of changing the current process to allow collection windows to be split into two intervals and then determining which intervals should be designated as cryo collection intervals (the split case), (3) insure that the weekly production target is met with high probability. These problems lead to MDP models with large state and action spaces and constraints to guarantee that the weekly production target is met with high probability. These models are computationally intractable for problems having state and action spaces of realistic cardinality. We consider two approaches to guarantee that the weekly production target is met with high probability: (1) a penalty function approach and (2) a chance constraint approach. For the MDP with penalty function approach, we first relax a constraint that significantly reduces the cardinality of the state space and provides a lower bound on the optimal expected weekly cost of collecting whole blood for cryo while satisfying the collection to completion constraint. We then present an action elimination procedure that coupled with the constraint relaxation leads to a computationally tractable lower bound. We then develop several heuristics that generate sub-optimal policies and provide an analytical description of the difference between the upper and lower bounds in order to determine the quality of the heuristics. For the multiple decision epoch MDP model with chance constraint approach, we first note by example that a straightforward application of dynamic programming can lead to a sub-optimal policy. We then restrict the model to a single decision epoch. We then use a computationally tractable rolling horizon procedure for policy determination. We also present a simple greedy heuristic (another rolling horizon decision making procedure) based on ranking the collection intervals by mid-drive pickup cost per unit of expected cryo collected, which results in a competitive sub-optimal solution and leads to the development of a practical decision support tool (DST). Using real data from the American Red Cross (ARC), we estimate that this DST reduces total cost by about 30% for the non-split case and 70% for the split case, compared to the current practice. Initial implementation of the DST at the ARC Southern regional manufacturing and service center supports our estimates and indicates the potential for significant improvement in current practice.
APA, Harvard, Vancouver, ISO, and other styles
8

Guilbaud, Sarah. "Etude du vieillissement des aérosols inorganiques industriels en milieu urbain." Thesis, Littoral, 2018. http://www.theses.fr/2018DUNK0524/document.

Full text
Abstract:
Lors de leur séjour dans l’atmosphère, les aérosols sont soumis, entre autres, à des processus d’agrégation, ainsi que de condensation sur leurs surfaces. Ces processus, dit de vieillissement, dépendent du temps de résidence des particules dans l’atmosphère, des conditions météorologiques et de l’environnement chimique rencontré. Cette étude vise à caractériser l’aérosol inorganique et étudier son évolution physico-chimique sur quelques dizaines de milliers de mètres, dans les panaches industriels et urbains où les concentrations atmosphériques en particules fines (PM₁₀) sont relativement élevées. Il s’agit notamment de rendre compte de l’évolution des particules d’aérosol primaire lors d’épisodes de formation d’aérosols secondaires inorganiques.Dans ce cadre, dans un premier temps, une nouvelle méthodologie d’analyse des aérosols inorganiques, à basse température, par cryo-microscopie électronique (cryo-TSEM-EDX) a été mise au point. L’enjeu était notamment de rendre compte de l’état de mélange des composés atmosphériques d’origine secondaire (composés semi-volatils), avec l’aérosol primaire. Ces développements analytiques ont tout d’abord été réalisés à l’aide de composés modèles, avant d’être validés sur particules environnementales. Dans un second temps, l’étude des processus physico-chimiques mis en jeu lors du vieillissement des aérosols, à l’échelle locale (quelques kilomètres), a été réalisée au cours d’une campagne intensive de terrain sur le dunkerquois, visant à étudier plus particulièrement l’évolution des émissions industrielles en milieu urbain. Des prélèvements ont ainsi été réalisés en bordure de zone industrielle et sur de sites "récepteurs" sous l’influence potentielle des émissions industrielles. Les analyses réalisées sur ces particules par cryo-SEM-EDX ont notamment montré qu’en zone péri-urbaine, à quelques kilomètres de la zone industrielle, des particules émises par la sidérurgie, comme les oxydes de fer, évoluaient rapidement, pour se retrouver, en mélange interne, associés à de la matière organique particulaire. En parallèle, nous avons pu caractériser, sur ces sites récepteurs, la présence d’aérosols inorganiques secondaires absents de la zone source et donc formés au sein de l’air ambiant, lors du survol de l’agglomération dunkerquoise
During their transport in the atmosphere, aerosols are subject, for example, to aggregation and condensation processes on their surfaces. These processes, so-called aging, depend on particle residence time in the atmosphere, meteorological conditions and chemical environment. This study aims to characterize inorganic aerosols and to highlight their physico-chemical evolution on a few tens of thousands meters, from an industrial area to the urban environment of Dunkirk (Northern France), in which PM₁₀ concentrations are quite important. It notably includes reporting on the evolution of primary particles during the formation of secondary inorganic aerosols. First, a new analytical methodology of inorganic aerosols, at low temperature, with cryo-electronic microscopy (cryo-TSEM-EDX) has been developed. Our goal was to characterize the mixing state of secondary atmospheric components (semi-volatile components) with primary aerosols. These analytical developments have been realized with model particles, before validation on real atmospheric particles. In a second time, the study of physico-chemical processes involved in the aging of industrial inorganic aerosols has been undertaken through an intensive field campaign. The objective is to describe the particles evolution between the industrial zone and receptor sites located in the suburb of Dunkirk. Our main results show that Fe-rich particles (Fe oxides), released in the atmosphere by steelworks, incorporate particulate organic matter in a few kilometers, between the source and receptor sites. In addition, the formation of secondary inorganic aerosols (SIA), not present at the source, has been evidenced. Clearly, these SIA have been formed during the transport of air masses over the urban area
APA, Harvard, Vancouver, ISO, and other styles
9

Taheri, Shabnam. "Macro and micro-evolutionary processes within a complex of species, case study of the tropical invasive earthworm : pontoscolex corethrurus." Thesis, Paris Est, 2018. http://www.theses.fr/2018PESC1024/document.

Full text
Abstract:
Pontoscolex corethrurus est le ver de terre le plus répandu dans les zones tropicales et sub-tropicales ; il est par conséquent très étudié en science du sol. Il est présent dans toutes sortes d’habitats, des sols pauvres de prairie aux sols riches de forêt primaire, et ses caractéristiques écologiques sont bien connues. Ses caractéristiques biologiques ont été moins étudiées. Peu de données sur la variation génétique au sein de cette morphoespèce sont disponibles à l’exception de la découverte en 2014 de deux lignées génétiquement différentes dans l’île São Miguel des Açores. De plus, son degré de ploïdie n’est pas connu et sa stratégie de reproduction n’est pas bien décrite. L’un des objectifs de cette thèse était de comprendre les mécanismes et les caractéristiques qui font de P. corethrurus un envahisseur efficace. Notre deuxième objectif était de rechercher des lignées cryptiques dans le monde entier et de décrire leurs relations phylogénétiques. Un troisième objectif était d’identifier quelle lignée était invasive et de caractériser la structure génétique de ses populations dans les aires native et d’introduction. Le dernier objectif était de tester si les différentes espèces du complexe avaient différents degrés de ploïdie, ce qui pourrait expliquer l’isolement reproducteur entre ces espèces. Une synthèse bibliographique de 265 études couvrant tous les aspects des connaissances sur P. corethrurus a montré que la stratégie – r et la plasticité de ce ver sont les caractéristiques clefs qui lui permettent d’envahir avec succès différents habitats. Afin d’étudier la diversité cryptique au sein de P. corethrurus à une échelle mondiale, j’ai examiné 792 spécimens collectés dans 25 pays et îles différents. Ces spécimens ont été analysés à l’aide de deux marqueurs mitochondriaux (COI et ADNr 16S), deux marqueurs nucléaires (internal transcribed spacers 2 et ADNr 28S) et une matrice de données de séquence multilocus obtenue à l’aide de la méthode AHE (Anchored Hybrid Enrichment). De plus, un total de 11 caractères morphologiques, internes comme externes, ont été étudiés dans toutes les lignées caractérisées génétiquement. Quatre espèces cryptiques (L1, L2, L3 et L4) ont été observées au sein du complexe d’espèces P. corethrurus. Elles ont été trouvées en sympatrie dans plusieurs localités et des analyses basées sur des marqueurs AFLP n’ont pas montré d’hybridation entre L1 et L3. La possibilité d’isolement reproducteur lié à des degrés de ploïdie différents a été évaluée à l’aide d’expérimentations de cytogénétique pour lesquelles plusieurs obstacles ont été rencontrés, à différentes étapes. Des résultats n’ont été obtenus que pour L4 (2n = 70). L’une des espèces du complexe, L1, était géographiquement répandue. Cette espèce correspondait aux spécimens topotypiques (échantillons provenant du jardin de Fritz Müller où P. corethrurus a été décrit en premier en 1856). Nous avons ciblé cette espèce invasive dans une étude de génétique des populations et de phylogéographie. En utilisant le gène COI et des marqueurs AFLP, nous avons révélé une faible diversité génétique dans la zone tropicale, probablement due à des évènements de colonisation récents et à une reproduction asexuelle. Cependant, la diversité génétique relativement élevée dans certaines populations, associée à un déséquilibre de liaison relativement faible, suggère aussi des évènements de reproduction sexuelle. A ce jour, c’est le premier travail réalisé à l’échelle mondiale sur la diversité génétique cryptique, la génétique des populations et la phylogéographie d’une espèce de vers de terre pérégrine dans la zone tropicale. J’ai produit la première revue complète des caractéristiques de P. corethrurus. De plus, son statut taxinomique a été clarifié ainsi que sa stratégie de reproduction qui est mixte (parthénogénèse et amphimixie). Ces informations seront utiles pour les expérimentations et les recherches futures sur les espèces du complexe P. corethrurus
Pontoscolex corethrurus is the most widespread earthworm species in the tropical and sub-tropical zones, it is hence one of the most studied earthworm in soil science. Ecological aspects of P. corethrurus, which is known to be present in a wide range of habitats from poor soils of pasture to rich soils of primary forest, were intensively investigated but biological aspects are less addressed. In particular, information on the genetic variation within the morphospecies is scarce except for the finding of two genetically differentiated lineages in São Miguel Island of Azores archipelago in 2014. Moreover, the ploidy degree of the morphospecies is not yet known and its reproduction strategy is not well understood. One of the objectives of this thesis was to understand the mechanisms and characteristics which make P. corethrurus a successful invader. Our second objective was to look for cryptic lineages in the whole world and to describe the phylogenetic relationships between them. A third objective was to identify which lineage was invasive and to characterize its population genetic structure in the native and the introduced ranges. The last objective was to test if the different species of the complex have different ploidy degrees (polyploid complex). This could eventually explain the reproductive isolation among these species. A bibliographic synthesis of 265 studies covering all subjects of knowledge on P. corethrurus showed that the r strategy and plasticity of this earthworm are the key characteristics which make it a successful invader in different habitats. In order to investigate the cryptic diversity within P. corethrurus in a world-wide scale, I examined 792 specimens collected from 25 different countries and islands. These specimens were analyzed using two mitochondrial (COI and 16S rDNA) and two nuclear (internal transcribed spacers 2 and 28S rDNA) markers and a large-scale multilocus sequence data matrix obtained using the Anchored Hybrid Enrichment (AHE) method. In addition, a total of 11 morphological characters, both internal and external, were investigated in all genetically characterized lineages. Four cryptic species (L1, L2, L3 and L4) were found within the P. corethrurus species complex, and four potentially new species within the genus Pontoscolex. The cryptic species were observed in sympatry at several localities, and analyses based on AFLP markers showed no hybridization among L1 and L3. The possibility of reproductive isolation among species of the complex because of different ploidy degrees was investigated by cytogenetic experimentations. Due to different obstacles encountered at different steps of the experimentations, results were just obtained for L4 (2n=70). One of the species belonging to the complex, L1, was particularly widespread per comparison with the others. This species corresponded to topotype specimens (samples from Fritz Müller’s garden where P. corethrurus was first described in 1856). Thus, we focused on this invasive species in a population genetics and phylogeography study. Using COI gene and AFLP markers, we revealed low genetic diversity through the tropical zone, probably due to recent colonization events and asexual reproduction type. Meanwhile, due to weak linkage disequilibrium and relatively high genetic diversity in some populations, sexual reproduction was suggested for L1.To date, this is the first study investigating at a world-wide scale, cryptic species diversity, population genetics and phylogeography of a peregrine earthworm species throughout tropical zone. I produced the first comprehensive review of all ecological and biological aspects of P. corethrurus. Moreover, the taxonomic status of P. corethrurus was clarified as well as its reproduction strategy which is mixed (parthenogenetic and sexual). All these findings represent potentially useful information for future experimentations and researches on species of P. corethrurus complex
APA, Harvard, Vancouver, ISO, and other styles
10

Wang, Chen-Hsing, and 王振興. "A High-Speed Word-Based RSA Crypto-Processor." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/62882018330106829721.

Full text
Abstract:
碩士
國立清華大學
電機工程學系
91
Security plays an important role in wireless communication system or network system today. Without security, people won’t safely take many applications on wired or wireless internet. Cryptography is a well solution that provides the security for our requirement and RSA cryptographic algorithm is a well known algorithm whose security is no problem. In this thesis, a high speed word-based modular multiplier is proposed based on our modified word-based Montgomery multiplication algorithm. The major advantage of word-based architecture is providing the scalable key length. In addition to the scalability of key length, it also has better flexibility between area and performance. Since the encryption and decryption of RSA cryptographic algorithm are long interger modular exponentiation, a software implementation is not efficient. It needs a dedicated hardware to help CPU handle the data encryption and decryption. Based on the word-based modular multiplier, we design a RSA crypto-processor. The RSA crypto-processor supports four basic modular operations: modular addition, modular subtraction, modular multiplication and modular exponentiation. A synthesis result reports that the RSA crypto-processor can run at 300MHz and the area of the RSA crypto-processor is about 150k gates. A 512 bit modular exponentiation only spends 1.38 ms.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Crypto Processor"

1

Fabris, Flavia. Waddington’s Processual Epigenetics and the Debate over Cryptic Variability. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198779636.003.0012.

Full text
Abstract:
This chapter reappraises Waddington’s processual theory of epigenetics and examines its implications for contemporary evolutionary biology. It focuses in particular on the ontological difference between two conflicting assumptions that have been conflated in the recent debate over the nature of cryptic variability: a substance view that is consistent with the modern synthesis and construes variability as a preexisting pool of random genetic variation; and a processual view, which derives from Waddington’s conception of developmental canalization and understands variability as an epigenetic process. The chapter also discusses how these opposing interpretations fare in their capacity to explain the genetic assimilation of acquired characters.
APA, Harvard, Vancouver, ISO, and other styles
2

Minelli, Alessandro. Evolvability and Its Evolvability. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780199377176.003.0007.

Full text
Abstract:
No universally accepted notion of evolvability is available, focus being alternatively put onto either genetic or phenotypic change. The heuristic power of this concept is best found when considering the intricacies of the genotype→phenotype map, which is not necessarily predictable, expression of variation depending on the structure of gene networks and especially on the modularity and robustness of developmental systems. We can hardly ignore evolvability whenever studying the role of cryptic variation in evolution, the often pervious boundary between phenotypic plasticity and the expression of a genetic polymorphism, the major phenotypic leaps that the mechanisms of development can produce based on point mutations, or the morphological stasis that reveals how robust a developmental process can be in front of genetic change. Evolvability is subject itself to evolution, but it is still uncertain to what extent there is positive selection for enhanced evolvability, or for evolvability biased in a specific direction.
APA, Harvard, Vancouver, ISO, and other styles
3

McEvoy, Rory, and Jonathan Betts, eds. Harrison Decoded. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780198816812.001.0001.

Full text
Abstract:
This volume centres on a clock, known as Clock B, built in the mid-1970s that achieved considerable acclaim after an extraordinary performance in a 2015 peer-reviewed public trial at the Royal Observatory, Greenwich. The clock was built according to an understanding of John Harrison’s unique theoretical approach to making precision pendulum clocks, which defies the standard approaches to making accurate clocks. The clock represents the culmination of over forty years of collaborative research into Harrison’s writing on the subject, which is scattered across a number of manuscripts and a book, printed shortly before his death. Ostensibly, Harrison set out to describe how to make his precision pendulum clock, but it is a mixture of his peripheral interests. Horological information is almost completely lost among vitriolic sentiments relating to his experiences with the Board of Longitude. However, as one reviewer surmised: ‘we are sorry to say that the public will be disappointed’ and another concluded that ‘it can only be excused by superannuated dotage’. The chapters provides contextual history and documentation of the analysis and decoding of the cryptic written descriptions. It presents this in parallel to the modern horological story of making, finishing, and adjusting Clock B; the process of testing, using electronic equipment to monitor the its performance and reaction to changes in environmental conditions, and, indeed, the mechanics behind the various compensating features of the design.
APA, Harvard, Vancouver, ISO, and other styles
4

Dworkin, Craig. Dictionary Poetics. Fordham University Press, 2020. http://dx.doi.org/10.5422/fordham/9780823287987.001.0001.

Full text
Abstract:
Dictionary Poetics analyses book-length poems from a number of writers who have used particular editions of specific dictionaries to structure their work. Spanning most of the 20th century, this study investigates poems by Louis Zukofsky and George Oppen (two “Objectivist” writers of the late 1920s and early 1930s), Clark Coolidge and Tina Darragh (two “Language Poets” with books from the 1970s and 1980s, respectively), and Harryette Mullen (a post-Black-Arts writer who flourished in the 1990s). By reverse-engineering poems, this study sets the critical record straight on multiple counts. Moreover, reading these poems in tandem with their source texts puts paid to the notion that even the most abstract and fragmentary avant-garde poems are nonsensical, meaningless, or impenetrable. When read from the right perspective, passages that at first appear to be discontinuous, irrational, or hopelessly cryptic suddenly appear logically consistent, rationally structured, and thematically coherent. Indeed, beyond the particular arguments and local readings, Dictionary Poetics argues that the new ways of writing pioneered by the literary avant-garde invite new ways of reading commensurate with their modes of composition. Dictionary Poetics maps and articulates the material surfaces of poems, tracing the networks of signifiers that undergird the more familiar representational schemes with which conventional readings have been traditionally concerned. In the process, this book demonstrates that new ways of reading can yield significant interpretive payoffs, open otherwise unavailable critical insights into the formal and semantic structures of a composition and transform our understanding of literary texts at their most fundamental levels.
APA, Harvard, Vancouver, ISO, and other styles
5

Contemporary Musicians: Profiles of the People in Music (Contemporary Musicians). Thomson Gale, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Contemporary Musicians: Profiles Of The People In Music (Contemporary Musicians). Thomson Gale, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Pilchak, Angela M. Contemporary Musicians: Profiles of the People in Music (Contemporary Musicians). Thomson Gale, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Pilchak, Angela M. Contemporary Musicians: Profiles Of The People In Music (Contemporary Musicians). Thomson Gale, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Contemporary Musicians: Profiles of the People in Music (Contemporary Musicians). Thomson Gale, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Pilchak, Angela M. Contemporary Musicians: Profiles of the People in Music (Contemporary Musicians). Thomson Gale, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Crypto Processor"

1

Breuer, Peter T., and Jonathan P. Bowen. "A Fully Homomorphic Crypto-Processor Design." In Lecture Notes in Computer Science, 123–38. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36563-8_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Breuer, Peter T., and Jonathan P. Bowen. "Erratum: A Fully Homomorphic Crypto-Processor Design." In Lecture Notes in Computer Science, E1. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36563-8_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Breuer, Peter T., and Jonathan P. Bowen. "Typed Assembler for a RISC Crypto-Processor." In Lecture Notes in Computer Science, 22–29. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-28166-2_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Choi, W. P., and L. M. Cheng. "Modelling the Crypto-Processor from Design to Synthesis." In Cryptographic Hardware and Embedded Systems, 25–36. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48059-5_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Breuer, Peter T., and Jonathan P. Bowen. "Idea: Towards a Working Fully Homomorphic Crypto-processor." In Lecture Notes in Computer Science, 131–40. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-04897-0_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

El-Hadedy, Mohamed, Xinfei Guo, Kevin Skadron, and Wen-Mei Hwu. "Edge Crypt-Pi: Securing Internet of Things with Light and Fast Crypto-Processor." In Advances in Intelligent Systems and Computing, 749–61. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-63092-8_50.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Gnanasekaran, Lavanya, Anas Salah Eddin, Halima El Naga, and Mohamed El-Hadedy. "Efficient RSA Crypto Processor Using Montgomery Multiplier in FPGA." In Advances in Intelligent Systems and Computing, 379–89. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-32523-7_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Pöpper, Christopher, Oliver Mischke, and Tim Güneysu. "MicroACP - A Fast and Secure Reconfigurable Asymmetric Crypto-Processor." In Lecture Notes in Computer Science, 240–47. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-05960-0_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Buchty, Rainer, Nevin Heintze, and Dino Oliva. "Cryptonite – A Programmable Crypto Processor Architecture for High-Bandwidth Applications." In Lecture Notes in Computer Science, 184–98. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24714-2_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Saikia, Monjul, and Md Anwar Hussain. "Implementation of Lightweight Crypto Processor Using Logistic Map for Wireless Sensor Network." In Advances in Communication, Devices and Networking, 509–19. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-3450-4_55.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Crypto Processor"

1

Murphy, Julian, and Alex Yakovlev. "An Alternating Spacer AES Crypto-processor." In 2006 Proceedings of the 32nd European Solid-State Circuits Conference. IEEE, 2006. http://dx.doi.org/10.1109/esscir.2006.307547.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Oliva, Dino, Rainer Buchty, and Nevin Heintze. "AES and the cryptonite crypto processor." In the international conference. New York, New York, USA: ACM Press, 2003. http://dx.doi.org/10.1145/951710.951738.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Nima, Karimpour Darav, Ebrahimi Atani Reza, Aghaei Erfan, Tahmasivand Ahmad, Rahmani Mahsa, and Moazam Mina. "CIARP: Crypto instruction-aware RISC processor." In 2012 IEEE Symposium on Computers & Informatics (ISCI). IEEE, 2012. http://dx.doi.org/10.1109/isci.2012.6222696.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bilgin, Begul, Elif Bilge Kavun, and Tolga Yalcin. "Towards an Ultra Lightweight Crypto Processor." In Privacy: Devices, Protocols, and Applications. IEEE, 2011. http://dx.doi.org/10.1109/lightsec.2011.17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Haghighizadeh, F., H. Attarzadeh, and M. Sharifkhani. "A Compact 8-Bit AES Crypto-processor." In 2010 Second International Conference on Computer and Network Technology. IEEE, 2010. http://dx.doi.org/10.1109/iccnt.2010.50.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Anwar, Hassan, Masoud Daneshtalab, Masoumeh Ebrahimi, Juha Plosila, Hannu Tenhunen, Sergei Dytckov, and Giovanni Beltrame. "Parameterized AES-Based Crypto Processor for FPGAs." In 2014 17th Euromicro Conference on Digital System Design (DSD). IEEE, 2014. http://dx.doi.org/10.1109/dsd.2014.90.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mirzaee, Reza Faghih, and Mohammad Eshghi. "Design of an ASIP IDEA crypto processor." In 2011 IEEE 2nd International Conference on Networked Embedded Systems for Enterprise Applications (NESEA). IEEE, 2011. http://dx.doi.org/10.1109/nesea.2011.6144954.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Dai, ZiBin, XueRong Yu, JinHai Su, and XingYuan Chen. "Accelerated Flexible Processor Architecture for Crypto Information." In 2007 2nd International Conference on Pervasive Computing and Applications. IEEE, 2007. http://dx.doi.org/10.1109/icpca.2007.4365476.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Megalingam, R. K., I. P. Joseph, P. Gautham, R. Parthasarathy, K. B. Deepu, and M. M. Nair. "Reconfigurable Cryptographic Processor for multiple crypto-algorithms." In 2011 IEEE Students' Technology Symposium (TechSym). IEEE, 2011. http://dx.doi.org/10.1109/techsym.2011.5783846.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Anwar, Hassan, Masoud Daneshtalab, Masoumeh Ebrahimi, Juha Plosila, and Hannu Tenhunen. "FPGA implementation of AES-based crypto processor." In 2013 IEEE 20th International Conference on Electronics, Circuits, and Systems (ICECS). IEEE, 2013. http://dx.doi.org/10.1109/icecs.2013.6815431.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Crypto Processor"

1

Chao, B. P. A review of user interface design techniques with applications to the Crypto Algorithm Message Processor (CAMP). Office of Scientific and Technical Information (OSTI), March 1989. http://dx.doi.org/10.2172/6355608.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mouha, Nicky. Review of the Advanced Encryption Standard. National Institute of Standards and Technology, July 2021. http://dx.doi.org/10.6028/nist.ir.8319.

Full text
Abstract:
The field of cryptography continues to advance at a very rapid pace, leading to new insights that may impact the security properties of cryptographic algorithms. The Crypto Publication Review Board ("the Board") has been established to identify publications to be reviewed. This report subjects the first standard to the review process: Federal Information Processing Standard (FIPS) 197, which defines the Advanced Encryption Standard (AES).
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography