Dissertations / Theses on the topic 'Crypto Processor'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 19 dissertations / theses for your research on the topic 'Crypto Processor.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Gaspar, Lubos. "Crypto-processor - architecture, programming and evaluation of the security." Phd thesis, Université Jean Monnet - Saint-Etienne, 2012. http://tel.archives-ouvertes.fr/tel-00978472.
Full textSbiaa, Fatma. "Modélisation et analyse de la sécurité au niveau système des primitives cryptographique." Thesis, Lorient, 2016. http://www.theses.fr/2016LORIS410.
Full textRegarding the increasing complexity of cryptographic devices, testing their security level against existing attacks requires a fast simulation environment. The Advanced Encryption Standard (AES) is widely used in embedded systems in order to secure the sensitive data. Still, some issues lie in the used key and the S-BOX. The present work presents a SystemC implementation of a chaos-based crypto-processor for the AES algorithm.The design of the proposed architecture is studied using the SystemC tools. The proposed correction approach exploits the chaos theory properties to cope with the defaulting parameters of the AES algorithm. Detailed experimental results are given in order to evaluate the security level and the performance criteria. In fact, the proposed crypto- system presents numerous interesting features, including a high security level, a pixel distributing uniformity, a sufficiently large key-space with improved key sensitivity, and acceptable speed
Buchty, Rainer. "Cryptonite a programmable crypto processor architecture for high bandwidth applications /." [S.l. : s.n.], 2002. http://deposit.ddb.de/cgi-bin/dokserv?idn=966328108.
Full textEgemen, Tufan. "Design And Systemc Implementation Of A Crypto Processor For Aes And Des Algorithms." Master's thesis, METU, 2007. http://etd.lib.metu.edu.tr/upload/12609110/index.pdf.
Full textKannavara, Raghudeep. "DESIGN AND PERFORMANCE ANALYSIS OF A SECURE PROCES-SOR SCAN-SP WITH CRYPTO-BIOMETRIC CAPABILITIES." Wright State University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=wright1254532768.
Full textGóes, Priscilla da Silva. "A perseguição inquisitorial e o criptojudaísmo : estudo dos processos envolvendo o sargento-mor Diogo Vaz e seus familiares (1662-1673)." Pós-Graduação em Ciências da Religião, 2017. http://ri.ufs.br/jspui/handle/123456789/6666.
Full textThe present dissertation, entitled "Inquisitorial persecution and Crypto-Judaism: A study of the processes involving the sergeant-general Diogo Vaz and his relatives (1662-1673)", has as a research object the description and analysis of the Inquisition, specifically in the persecution of New Christians accused of Judaizers in the Iberian Peninsula, as well as in the Colony. We sought to investigate the cases of Diogo Vaz Penalvo, his sister Anna Rodrigues and other members of his family. For this, we are based on the categories of the Ginzburg (2001) index of the microhistory studied by Giovanni Levi (1992) and Ginzburg (2006), the category of pariah explained by Weber (2010) and the sociology of secrecy, of Simmel (2009), of fundamental importance for the maintenance of Crypto-Judaism. From this, we follow the following steps: to reconstruct the steps of members of a family arrested by the Holy Office and compare them with other cases already studied, collaborating with the study of religious practices that resisted Catholicism in the colonial period; to find in the reports of the documents indications of religious practices considered deviant from the Catholic faith. Finally, this research aims to contribute to the study of the inquisition with a focus on the persecution of the Crypto-Jews, in an attempt to know the religious practices of a family that suffered for more than a decade humiliation, exile and fire.
A presente dissertação, intitulada “A perseguição inquisitorial e o Criptojudaísmo: Estudo dos processos envolvendo o sargento-mor Diogo Vaz e seus familiares (1662-1673)”, tem como objeto de pesquisa a descrição e análise da Inquisição, especificamente na perseguição aos cristãos-novos acusados de judaizantes na Península Ibérica, assim como na Colônia. Buscamos investigar os casos de Diogo Vaz Penalvo, de sua irmã Anna Rodrigues e de outros membros da sua família. Para tal, baseamo-nos nas categorias do paradigma indiciário de Ginzburg (2001), da micro-história estudada por Giovanni Levi (1992) e Ginzburg (2006), a categoria de pária explicada por Weber (2010) e a sociologia do segredo, de Simmel (2009), de fundamental importância para a manutenção do criptojudaísmo. A partir disso, seguimos os seguintes caminhos: reconstruir os passos de membros de uma família presa pelo Santo Ofício e compará-los com outros casos já estudados, colaborando com o estudo de práticas religiosas que resistiram ao catolicismo no período colonial; encontrar nos relatos dos documentos indícios de práticas religiosas consideradas desviantes da fé católica. Por fim, esta pesquisa visa contribuir para o estudo do tema da inquisição com o foco na perseguição aos criptojudeus, na tentativa de conhecer as práticas religiosas de uma família que sofreu durante mais de uma década a humilhação, o degredo, a tomada de bens e o fogo.
São Cristóvão, SE
Zeng, Chenxi. "A minimum cost and risk mitigation approach for blood collection." Diss., Georgia Institute of Technology, 2016. http://hdl.handle.net/1853/54966.
Full textGuilbaud, Sarah. "Etude du vieillissement des aérosols inorganiques industriels en milieu urbain." Thesis, Littoral, 2018. http://www.theses.fr/2018DUNK0524/document.
Full textDuring their transport in the atmosphere, aerosols are subject, for example, to aggregation and condensation processes on their surfaces. These processes, so-called aging, depend on particle residence time in the atmosphere, meteorological conditions and chemical environment. This study aims to characterize inorganic aerosols and to highlight their physico-chemical evolution on a few tens of thousands meters, from an industrial area to the urban environment of Dunkirk (Northern France), in which PM₁₀ concentrations are quite important. It notably includes reporting on the evolution of primary particles during the formation of secondary inorganic aerosols. First, a new analytical methodology of inorganic aerosols, at low temperature, with cryo-electronic microscopy (cryo-TSEM-EDX) has been developed. Our goal was to characterize the mixing state of secondary atmospheric components (semi-volatile components) with primary aerosols. These analytical developments have been realized with model particles, before validation on real atmospheric particles. In a second time, the study of physico-chemical processes involved in the aging of industrial inorganic aerosols has been undertaken through an intensive field campaign. The objective is to describe the particles evolution between the industrial zone and receptor sites located in the suburb of Dunkirk. Our main results show that Fe-rich particles (Fe oxides), released in the atmosphere by steelworks, incorporate particulate organic matter in a few kilometers, between the source and receptor sites. In addition, the formation of secondary inorganic aerosols (SIA), not present at the source, has been evidenced. Clearly, these SIA have been formed during the transport of air masses over the urban area
Taheri, Shabnam. "Macro and micro-evolutionary processes within a complex of species, case study of the tropical invasive earthworm : pontoscolex corethrurus." Thesis, Paris Est, 2018. http://www.theses.fr/2018PESC1024/document.
Full textPontoscolex corethrurus is the most widespread earthworm species in the tropical and sub-tropical zones, it is hence one of the most studied earthworm in soil science. Ecological aspects of P. corethrurus, which is known to be present in a wide range of habitats from poor soils of pasture to rich soils of primary forest, were intensively investigated but biological aspects are less addressed. In particular, information on the genetic variation within the morphospecies is scarce except for the finding of two genetically differentiated lineages in São Miguel Island of Azores archipelago in 2014. Moreover, the ploidy degree of the morphospecies is not yet known and its reproduction strategy is not well understood. One of the objectives of this thesis was to understand the mechanisms and characteristics which make P. corethrurus a successful invader. Our second objective was to look for cryptic lineages in the whole world and to describe the phylogenetic relationships between them. A third objective was to identify which lineage was invasive and to characterize its population genetic structure in the native and the introduced ranges. The last objective was to test if the different species of the complex have different ploidy degrees (polyploid complex). This could eventually explain the reproductive isolation among these species. A bibliographic synthesis of 265 studies covering all subjects of knowledge on P. corethrurus showed that the r strategy and plasticity of this earthworm are the key characteristics which make it a successful invader in different habitats. In order to investigate the cryptic diversity within P. corethrurus in a world-wide scale, I examined 792 specimens collected from 25 different countries and islands. These specimens were analyzed using two mitochondrial (COI and 16S rDNA) and two nuclear (internal transcribed spacers 2 and 28S rDNA) markers and a large-scale multilocus sequence data matrix obtained using the Anchored Hybrid Enrichment (AHE) method. In addition, a total of 11 morphological characters, both internal and external, were investigated in all genetically characterized lineages. Four cryptic species (L1, L2, L3 and L4) were found within the P. corethrurus species complex, and four potentially new species within the genus Pontoscolex. The cryptic species were observed in sympatry at several localities, and analyses based on AFLP markers showed no hybridization among L1 and L3. The possibility of reproductive isolation among species of the complex because of different ploidy degrees was investigated by cytogenetic experimentations. Due to different obstacles encountered at different steps of the experimentations, results were just obtained for L4 (2n=70). One of the species belonging to the complex, L1, was particularly widespread per comparison with the others. This species corresponded to topotype specimens (samples from Fritz Müller’s garden where P. corethrurus was first described in 1856). Thus, we focused on this invasive species in a population genetics and phylogeography study. Using COI gene and AFLP markers, we revealed low genetic diversity through the tropical zone, probably due to recent colonization events and asexual reproduction type. Meanwhile, due to weak linkage disequilibrium and relatively high genetic diversity in some populations, sexual reproduction was suggested for L1.To date, this is the first study investigating at a world-wide scale, cryptic species diversity, population genetics and phylogeography of a peregrine earthworm species throughout tropical zone. I produced the first comprehensive review of all ecological and biological aspects of P. corethrurus. Moreover, the taxonomic status of P. corethrurus was clarified as well as its reproduction strategy which is mixed (parthenogenetic and sexual). All these findings represent potentially useful information for future experimentations and researches on species of P. corethrurus complex
Wang, Chen-Hsing, and 王振興. "A High-Speed Word-Based RSA Crypto-Processor." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/62882018330106829721.
Full text國立清華大學
電機工程學系
91
Security plays an important role in wireless communication system or network system today. Without security, people won’t safely take many applications on wired or wireless internet. Cryptography is a well solution that provides the security for our requirement and RSA cryptographic algorithm is a well known algorithm whose security is no problem. In this thesis, a high speed word-based modular multiplier is proposed based on our modified word-based Montgomery multiplication algorithm. The major advantage of word-based architecture is providing the scalable key length. In addition to the scalability of key length, it also has better flexibility between area and performance. Since the encryption and decryption of RSA cryptographic algorithm are long interger modular exponentiation, a software implementation is not efficient. It needs a dedicated hardware to help CPU handle the data encryption and decryption. Based on the word-based modular multiplier, we design a RSA crypto-processor. The RSA crypto-processor supports four basic modular operations: modular addition, modular subtraction, modular multiplication and modular exponentiation. A synthesis result reports that the RSA crypto-processor can run at 300MHz and the area of the RSA crypto-processor is about 150k gates. A 512 bit modular exponentiation only spends 1.38 ms.
Sun, Ming-Cheng, and 孫明誠. "Design of a Scalable RSA and ECC Crypto-Processor." Thesis, 2002. http://ndltd.ncl.edu.tw/handle/47022622698893853417.
Full text國立清華大學
電機工程學系
90
With the rapid advance in communication technology, more and more applications such as e-commerce and wireless networking are becoming possible. Protecting the sensitive information when transmitted on the insecure communication channel is an essential issue in such applications. Public-key cryptography such as the RSA algorithm or elliptic curve cryptography plays a vital role in modern security system, because it can solve the problem of key distribution and possess the signature property. In this thesis we propose an asymmetric crypto-processor (ACP) core. The ACP core can support scalable keys of length up to 2048 bits for both RSA and ECC in GF(p) or GF(2 m ). In order to reduce silicon area, the word-based architecture is adopted in our ACP core. This feature provides a trade-o between security and computation time. Since the original Montgomery's multiplication algorithm needs nal reduction which will decrease the speed, a modied Montgomery multiplication is used to eliminate the nal reduction in our datapath. With moderate area overhead, the circuit can achieves an encryption rate of 276 Kbps for 512-bit RSA, 73.3 Kbps for 160-bit ECC in GF(p) and 65.9 Kbps for 160-bit ECC in GF(2 m ), with a 220 MHz clock.
"A novel high speed GF (2173) elliptic curve crypto-processor." 2003. http://library.cuhk.edu.hk/record=b5891648.
Full textThesis (M.Phil.)--Chinese University of Hong Kong, 2003.
Includes bibliographical references (leaves 69-70).
Abstracts in English and Chinese.
Chapter Chapter 1 --- Introduction --- p.1
Chapter 1.1 --- Introduction to Elliptic Curve Crypto-processor --- p.1
Chapter 1.2 --- Aims --- p.2
Chapter 1.3 --- Contributions --- p.2
Chapter 1.4 --- Thesis Outline --- p.3
Chapter Chapter 2 --- Cryptography --- p.5
Chapter 2.1 --- Introduction to Cryptography --- p.5
Chapter 2.2 --- Public-key Cryptosystems --- p.6
Chapter 2.3 --- Secret-key Cryptosystems --- p.9
Chapter 2.4 --- Discrete Logarithm Problem --- p.9
Chapter 2.5 --- Comparison between ECC and RSA --- p.10
Chapter 2.6 --- Summary --- p.13
Chapter Chapter 3 --- Mathematical Background in Number Systems --- p.14
Chapter 3.1 --- Introduction to Number Systems --- p.14
Chapter 3.2 --- "Groups, Rings and Fields" --- p.14
Chapter 3.3 --- Finite Fields --- p.15
Chapter 3.4 --- Modular Arithmetic --- p.16
Chapter 3.5 --- Optimal Normal Basis --- p.16
Chapter 3.5.1 --- What is a Normal Basis? --- p.17
Chapter 3.5.2 --- Addition --- p.17
Chapter 3.5.3 --- Squaring --- p.18
Chapter 3.5.4 --- Multiplication --- p.19
Chapter 3.5.5 --- Optimal Normal Basis --- p.19
Chapter 3.5.6 --- Generation of the Lambda Matrix --- p.20
Chapter 3.5.7 --- Inversion --- p.22
Chapter 3.6 --- Summary --- p.24
Chapter Chapter 4 --- Introduction to Elliptic Curve Mathematics --- p.26
Chapter 4.1 --- Introduction --- p.26
Chapter 4.2 --- Mathematical Background of Elliptic Curves --- p.26
Chapter 4.3 --- Elliptic Curve over Real Number System --- p.27
Chapter 4.3.1 --- Order of the Elliptic Curves --- p.28
Chapter 4.3.2 --- Negation of Point P --- p.28
Chapter 4.3.3 --- Point at Infinity --- p.28
Chapter 4.3.4 --- Elliptic Curve Addition --- p.29
Chapter 4.3.5 --- Elliptic Curve Doubling --- p.30
Chapter 4.3.6 --- Equations of Curve Addition and Curve Doubling --- p.31
Chapter 4.4 --- Elliptic Curve over Finite Fields Number System --- p.32
Chapter 4.4.1 --- Elliptic Curve Operations in Optimal Normal Basis Number System --- p.32
Chapter 4.4.2 --- Elliptic Curve Operations in Projective Coordinates --- p.33
Chapter 4.4.3 --- Elliptic Curve Equations in Projective Coordinates --- p.34
Chapter 4.5 --- Curve Multiplication --- p.36
Chapter 4.6 --- Elliptic Curve Discrete Logarithm Problem --- p.37
Chapter 4.7 --- Public-key Cryptography in Elliptic Curve Cryptosystem --- p.38
Chapter 4.8 --- Diffie-Hellman Key Exchange in Elliptic Curve Cryptosystem --- p.38
Chapter 4.9 --- Summary --- p.39
Chapter Chapter 5 --- Design Architecture --- p.40
Chapter 5.1 --- Introduction --- p.40
Chapter 5.2 --- Criteria for the Low Power System Design --- p.40
Chapter 5.3 --- Simplification in ONB Curve Addition Equations over Projective Coordinates --- p.41
Chapter 5.4 --- Finite Field Adder Architecture --- p.43
Chapter 5.5 --- Finite Field Squaring Architecture --- p.43
Chapter 5.6 --- Finite Field Multiplier Architecture --- p.44
Chapter 5.7 --- 3-way Parallel Finite Field Multiplier --- p.46
Chapter 5.8 --- Finite Field Arithmetic Logic Unit --- p.47
Chapter 5.9 --- Elliptic Curve Crypto-processor Control Unit --- p.50
Chapter 5.10 --- Register Unit --- p.52
Chapter 5.11 --- Summary --- p.53
Chapter Chapter 6 --- Specifications and Communication Protocol of the IC --- p.54
Chapter 6.1 --- Introduction --- p.54
Chapter 6.2 --- Specifications --- p.54
Chapter 6.3 --- Communication Protocol --- p.57
Chapter Chapter 7 --- Results --- p.59
Chapter 7.1 --- Introduction --- p.59
Chapter 7.2 --- Results of the Public-key Cryptography --- p.59
Chapter 7.3 --- Results of the Session-key Cryptography --- p.62
Chapter 7.4 --- Comparison with the Existing Crypto-processor --- p.65
Chapter 7.5 --- Power Consumption --- p.66
Chapter Chapter 8 --- Conclusion --- p.68
Bibliography --- p.69
Appendix --- p.71
173-bit Type II ONB Multiplication Table --- p.71
Layout View of the Elliptic Curve Crypto-processor --- p.76
Schematics of the Elliptic Curve Crypto-processor --- p.77
Schematics of the System Level Design --- p.78
Schematics of the I/O Control Interface --- p.79
Schematics of the Curve Multiplication Module --- p.80
Schematics of the Curve Addition Module --- p.81
Schematics of the Curve Doubling Module --- p.82
Schematics of the Field Inversion Module --- p.83
Schematics of the Register Unit --- p.84
Schematics of the Datapath --- p.85
Schematics of the Finite Field ALU --- p.86
Schematics of the 3-way Parallel Multiplier --- p.87
Schematics of the Multiplier Elements --- p.88
Schematics of the Field Adder --- p.89
Schematics of Demultiplexer --- p.90
Schematics of the Control of the Demultiplexer --- p.91
Chang, Sun-Wei, and 張孫偉. "VLSI Architectures and FPGA Implementation for Universal AES Crypto-processor." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/09681771627355231800.
Full text國立成功大學
電機工程學系碩博士班
91
Sun-Wei Chang* Jhing-Fa Wang** Department of Electrical Engineering National Cheng Kung University, Tainan, Taiwan, R.O.C. This thesis presents an Intellectual Property (IP) core of the entire Advanced Encryption Standard (AES) algorithm[1]. Our design utilizes the T-Box algorithm to implement the Rijndael round function[2]. By analyzing the pipelining data flow, a new architecture, which combines the multiplexing and the iteration architecture, is also proposed. The designs are implemented using the Integrated Systems Engineering (ISE) 5.1i software [3] on a single Virtex-E XCV812E [4] Field Programmable Gate Array (FPGA) device. As a result, the AES IP core operates at 61MHz with the key scheduler resulting in a throughput of 1.9Gbps for the AES encryption and decryption with the block size of 128 bits and the flexible key size. Finally, comparison is provided between our design and similar existing implementations. * The author ** The advisor
"An inductive RFID system with build-in asynchronous ECC crypto-processor." Thesis, 2008. http://library.cuhk.edu.hk/record=b6074553.
Full textShort and medium range RFIDs generally are passive transponders while long range RFID is of either passive or active type. In this thesis, a short transmission range RFID transponder is presented. This is a passive transponder which generates power for internal circuitry by inductive coupling. For automatic identification applications such as electronic money tickets, the requirements of endurance, weight, size as well as cost appeal to use passive transponder rather than active transponder. Researches on the passive transponders have created a great challenge for engineers in terms of the tradeoff between power constraints, processing power and data transmission range.
The presented RFID transponder system adheres to the ISO 14443 standard Type B specification communication interface, which operates at 13.56MHz carrier frequency with a maximum read range around 50 mm. This research implemented a low power, high security, and long read range RFID transponder. For the analog RF interface, a series of novel architectures are adopted to improve the data transmission range. The digital core in the presented crypto-processor for data security. The asynchronous architecture has the advantages of fast computation time, low power consumption and small area. These are the attractive reasons to implement the core processing units using an asynchronous architecture.
This RFID system was fabricated with a 0.35um two-poly four-metal standard CMOS process with the silicon area of 1516 um x 1625 um. The measurement results show that the analog RF interface can generate a maximum 5.45mW power while the digital core circuit consumes only 2.77mW. In the wireless communication tests, the transponder read range can reach as far as 50 mm.
Leung, Pak Keung.
"June 2008."
Adviser: Choy Chin Sing.
Source: Dissertation Abstracts International, Volume: 70-03, Section: B, page: 1847.
Thesis (Ph.D.)--Chinese University of Hong Kong, 2008.
Includes bibliographical references.
Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web.
Electronic reproduction. [Ann Arbor, MI] : ProQuest Information and Learning, [200-] System requirements: Adobe Acrobat Reader. Available via World Wide Web.
Abstracts in English and Chinese.
School code: 1307.
Buchty, Rainer [Verfasser]. "Cryptonite : a programmable crypto processor architecture for high bandwidth applications / Rainer Buchty." 2002. http://d-nb.info/966328108/34.
Full textLin, Yung-Chang, and 林永昌. "A Word-Based RSA Public-Key Crypto-Processor Core for IC Smart Card." Thesis, 2001. http://ndltd.ncl.edu.tw/handle/65121253792582962032.
Full text國立清華大學
電機工程學系
89
With a fast development of network communication, the application of IC smart card becomes more and more frequent. Since many personalized data are stored in the chip of IC smart card, the capability of high data security is an important issue of IC smart card. Therefore, a word-based RSA crypto-processor for IC smart card is proposed. Due to the lower cost issue on smart card, an RSA crypto-processor core with small area is essential. In order to reduce silicon area, the word-based architecture is attached to RSA crypto-processor core. Using word-based architecture, the different key length can be implemented by appropriately controlling the iteration of loop. This feacture provides the flexibility between security and computation time for user. Since our RSA crypto-processor core is based on Montgomery's algorithm, the final reduction will decrease the speed. Therefore, we modify word-based Mongomery's algorithm to eliminate this problem. Moreover, instead of using software, we design hardware to generate modular multiplicative inverse N0' . The resulting 16-bit word-based RSA crypto-processor core, which is synthesized by 0.35um cell library, can output 1024 bits encrypted/decrypted data in 51ms at the operating frequency is 125 MHZ. Finally, we applied 16-bit word-based RSA crypto-processor core to asymmetric crypto processor (ACP). Based on TSMC 0.35um 1P4M technology, an ACP chip is implemented.
Hong, Jin-Hua, and 洪進華. "RSA Public Key Crypto-Processor Core Design and Hierarchical System Test Using IEEE 1149 Family." Thesis, 2000. http://ndltd.ncl.edu.tw/handle/47801842663306688476.
Full text國立清華大學
電機工程學系
88
In this dissertation, bit-level systolic arrays for RSA public key cryptosystem are designed based on improved Montgomery''s algorithm. The improved Montgomery''s algorithm guarantees that the partial products in all modular multiplications fall in the range [0,2^{n+1}), and hence the post adjustment needed in the Montgomery''s algorithm is removed. Since the post adjustment in the original algorithm is removed, the improved algorithm leads to both simpler architecture and better performance. An RSA cryptosystem chip was designed and simulated, which implements a 512-bit RSA cryptosystem. The time to calculate a modular exponentiation is about 2n^2 clock cycles,where n is the word length, and the clock cycle is roughly equal to the delay time of a full adder. The utilization of the multiplier is 100% by interleaving the square and multiplication in modular exponentiation. Moreover, local interconnection, regularity, and modularity make the proposed architecture suitable for VLSI implementation. Furthermore, we propose a radix-4 modular multiplication algorithm based on Montgomery''s algorithm, and a radix-4 cellular-array modular multiplier based on Booth''s multiplication algorithm. The radix-4 modular multiplier can be used to implement fast RSA cryptosystem. Due to reduced number of iterations and pipelining, our modular multiplier is four times faster than the cellular-array modular multiplier based on the original Montgomery''s algorithm. The time to calculate a modular exponentiation is about n^2 clock cycles. For the purpose of hierarchical system test, an IEEE 1149.5 Module Test and Maintenance (MTM) Bus Slave module interface core is presented, which is used for direct access from the system bus to the IEEE 1149.1 chip-level or on-chip buses to facilitate hierarchical system test and diagnosis. The hierarchical test methodology also is presented, which is applicable to the system-on-chip environment. All the standard 1149.1 instructions, such as SAMPLE/PRELOAD, EXTEST, BYPASS, and even RUNBIST, can be performed within three 1149.5 Read/Write-Data message cycles. The messages are transmitted between the MTM-Bus Master module (M-module) and the Slave module (S-module). We adopt the Full TAP Control method to activate the 1149.1 Boundary-Scan paths via the 1149.5 MTM-Bus. Our S-module interface circuit implements 16 CORE commands and one Read/Write Data command. It has been prototyped using an FPGA chip and implemented by a full-custom chip. Hierarchical test of multiple 1149.1 compatible boards has been experimented and verified.
Χατζηδημητρίου, Επαμεινώνδας. "Διερεύνηση του προτύπου P1619 για διαμοιραζόμενα αποθηκευτικά μέσα και πρότυπες προτάσεις υλοποίησης." Thesis, 2013. http://hdl.handle.net/10889/7933.
Full textA standard for the protection of data in shared storage media has been proposed by IEEE, the IEEE P1619. It specifies the fundamental elements of an architecture that provides security in block-based shared storage media applying block-cipher encryption algorithms to blocks of data. The newly presented standard has attracted the attention of the market vendors, as a good solution to the demands of the consumers for higher security levels in storage devices. The manufacturers have already developed future platforms based on IEEE P1619. Recent research works introduced various approaches targeting their adoption in future products. The proposed approaches are aiming to exploit either computer resources (software approaches) or special purpose hardware. This work focuses on the Narrow-block Tweakable encryption scheme (XTS-AES transform) and explores various architectures offering a variety of characteristics to the final implementation. This is the first, to the authors knowledge, attempt to explore the various architecture approaches that have been proposed until now and additionally introduce new ones, with an aim to highlight the appropriate architecture for a variety of applications. The key feature of the proposed architectures is parallelism, with respect to data block processing. The target is to exploit in full the resources of the core(s) implementing the IEEE P1619 and achieve the highest performance, respecting various design criteria as low cost, and/or design complexity. Basic details regarding IEEE P1619 and its dominant unit (the XTS-AES transform) are offered, a summary of previous works is presented and several issues are considered for potential optimization of the system architecture. Novel architectures are introduced, exploring time-scheduling of the processes to be performed and the characteristics of the various architectures are analyzed and compared.
Yang, Chia-Hao, and 楊家豪. "Annealing behavior and mechamical property in pure copper processed by equal channel angular extrusion and cryo-rolling." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/82054251681715473799.
Full text逢甲大學
材料科學所
97
Abstract Ultrafine-grained (UFG) and nanocrystalline (NC) metals usually have higher strength than the coarse-grained counterpart but also exhibit low tensile ductility at room temperature. Recently, much attention has been drawn to improve the tensile ductility in the UFG/NC metals. In this study, pure copper (99.99%) was processed by equal channel angular extrusion (ECAE) and cryo-rolling to a rolling reduction of 95%. The as-deformed sample was then annealed at various temperatures ranging from 100oC to 320oC for 1 hour. The mechanical properties and microstructure of the as-deformed and isochronally annealed samples were investigated. to study the mechanical and annealing behavior of the NC copper. Low stacking fault energy (SFE) copper facilitates twin formation. Twins and/or stacking faults can hinder dislocation slip and increase dislocation accumulation and consequently increase work hardening rate and enhance tensile ductility. The yield stress (YS) is increased to 510MPa and the total tensile elongation is 6.1% in the as-deformed copper. The as-deformed microstructure appears to be lamellar structure and dislocation density within the grain interior is high. The annealed samples show that the average boundary spacing increases with increasing annealing temperature. When the NC copper was annealed at temperature below 200oC, the boundary spacing followd a stable growth rate and exhibits continuous recrystallization phenomenon, When the annealing temperature is above 200oC, the average boundary spacing increased dramatically and shows discontinuous recrystallization phenomenon. Samples annealed at 200oC for 30 minutes and 160oC for 5 hours appear to have better mechanical properties (higher strength and ductility combination) than other samples. However, the ductility of the NC copper is still fairly limited in the present work.