Search Results - "algorithm hardware implementation"

Refine Results
  1. 1

    Minimum-clock-cycle Itoh-Tsujii algorithm hardware implementation for cryptography applications over GF (2 m ) fields by Parrilla, L., Lloris, A., Castillo, E., García, A.

    ISSN: 0013-5194, 1350-911X
    Published: Stevenage Institution of Engineering and Technology 30.08.2012
    Published in Electronics letters (30.08.2012)
    Get full text
    Journal Article
  2. 2

    Minimum-clock-cycle Itoh-Tsujii algorithm hardware implementation for cryptography applications over GF(2^sup m^) fields by Parrilla, L, Lloris, A, Castillo, E, García, A

    ISSN: 0013-5194, 1350-911X
    Published: Stevenage John Wiley & Sons, Inc 30.08.2012
    Published in Electronics letters (30.08.2012)
    “…Inversion over finite fields is the most costly basic operation for diverse cryptographic applications, such as elliptic curve cryptography and others. The…”
    Get full text
    Journal Article
  3. 3

    Local Interpolation-based Polar Format SAR: Algorithm, Hardware Implementation and Design Automation by Zhu, Qiuling, Berger, Christian R., Turner, Eric L., Pileggi, Larry, Franchetti, Franz

    ISSN: 1939-8018, 1939-8115
    Published: Boston Springer US 01.06.2013
    Published in Journal of signal processing systems (01.06.2013)
    “…In this paper we present a local interpolation-based variant of the well-known polar format algorithm used for synthetic aperture radar (SAR) image formation…”
    Get full text
    Journal Article
  4. 4

    AES Encryption Algorithm Hardware Implementation: Throughput and Area Comparison of 128, 192 and 256-bits Key by El Adib, Samir, Raissouni, Naoufal

    ISSN: 2089-4864, 2089-4864
    Published: 01.07.2012
    “…Advanced Encryption Standard (AES) adopted by the National Institute of Standards and Technology (NIST) to replace existing Data Encryption Standard (DES), as…”
    Get full text
    Journal Article
  5. 5

    AES Encryption Algorithm Hardware Implementation: Throughput and Area Comparison of 128, 192 and 256-bits Key by El Adib, Samir, Raissouni, Naoufal

    ISSN: 2089-4864, 2089-4864
    Published: Yogyakarta IAES Institute of Advanced Engineering and Science 01.07.2012
    “…Advanced Encryption Standard (AES) adopted by the National Institute of Standards and Technology (NIST) to replace existing Data Encryption Standard (DES), as…”
    Get full text
    Journal Article
  6. 6

    AES Encryption Algorithm Hardware Implementation Architecture: Resource and Execution Time Optimization by El Adib, Samir, Raissouni, Naoufal

    ISSN: 2089-3299, 2089-3299
    Published: Yogyakarta IAES Institute of Advanced Engineering and Science 16.06.2012
    “…In the present paper we present an architecture to implement Advanced Encryption Standard (AES) Rijndael algorithm in reconfigurable hardware. Rijndael…”
    Get full text
    Journal Article
  7. 7

    Parallel Smith-Waterman Algorithm Hardware Implementation for Ancestors and Offspring Gene Tracer by Seliem, Asmaa G., Abou El-Wafa, Wael, Galal, A. I. A., Hamed, Hesham F. A.

    Published: IEEE 01.03.2016
    “…Computational Molecular Biology, Bioinformatics and Genomics are the most intriguing sciences to understand the human genome and diseases. These sciences use…”
    Get full text
    Conference Proceeding
  8. 8

    Vehicle image edge detection algorithm hardware implementation on FPGA by Zhang Shanshan, Wang Xiaohong

    ISBN: 9781424472352, 1424472350
    ISSN: 2161-9069
    Published: IEEE 01.10.2010
    “…This paper use System Generator tool and modular construction methods to build a image algorithm platform in MATLAB R2007a, so as to Implement edge detection…”
    Get full text
    Conference Proceeding
  9. 9

    Implementation of Real-Time Space Target Detection and Tracking Algorithm for Space-Based Surveillance by Su, Yueqi, Chen, Xin, Liu, Gaorui, Cang, Chen, Rao, Peng

    ISSN: 2072-4292, 2072-4292
    Published: Basel MDPI AG 01.06.2023
    Published in Remote sensing (Basel, Switzerland) (01.06.2023)
    “…Space-based target surveillance is important for aerospace safety. However, with the increasing complexity of the space environment, the stellar target and…”
    Get full text
    Journal Article
  10. 10

    Application of soft computing techniques for maximum power point tracking of SPV system by Dileep, G., Singh, S.N.

    ISSN: 0038-092X, 1471-1257
    Published: New York Elsevier Ltd 01.01.2017
    Published in Solar energy (01.01.2017)
    “…Conventional maximum power point tracking (MPPT) algorithms fails to track peak power from a solar photovoltaic panel (SPV) effectively under rapidly changing…”
    Get full text
    Journal Article
  11. 11

    An 11.2-pJ/bit Reconfigurable Dynamic Chaotic Encryption ASIC for IoT by Feng, Jundong, Ai, Jia, Li, Fangjie, Wang, Junchao

    ISSN: 2327-4662, 2327-4662
    Published: Piscataway IEEE 01.12.2024
    Published in IEEE internet of things journal (01.12.2024)
    “…Chaotic encryption is applied as a lightweight symmetric cryptography in Internet of Things (IoT). In symmetric encryption, system security depends on the…”
    Get full text
    Journal Article
  12. 12

    Implementation of Sobel operator based image edge detection on FPGA by Ravivarma, G., Gavaskar, K., Malathi, D., Asha, K.G., Ashok, B., Aarthi, S.

    ISSN: 2214-7853, 2214-7853
    Published: Elsevier Ltd 2021
    Published in Materials today : proceedings (2021)
    “… In Sobel edge detection algorithm hardware implementation is chosen because it can work with less decline in noise at high level…”
    Get full text
    Journal Article
  13. 13

    Hardware Design and Implementation of a Lightweight Saber Algorithm Based on DRC Method by Zheng, Weifang, Zhang, Huihong, Zhang, Yuejun, Wen, Yongzhong, Lv, Jie, Ni, Lei, Li, Zhiyi

    ISSN: 2079-9292, 2079-9292
    Published: Basel MDPI AG 03.06.2023
    Published in Electronics (Basel) (03.06.2023)
    “…). To address the problems of long delay and the high power consumption of Saber algorithm hardware implementation, a lightweight Saber algorithm hardware design scheme based on the joint optimization…”
    Get full text
    Journal Article
  14. 14

    Active Fences against Voltage-based Side Channels in Multi-Tenant FPGAs by Krautter, Jonas, Gnad, Dennis R.E., Schellenberg, Falk, Moradi, Amir, Tahoori, Mehdi B.

    ISSN: 1558-2434
    Published: IEEE 01.11.2019
    “… However, they require significant efforts and tailoring for a specific algorithm, hardware implementation and mapping…”
    Get full text
    Conference Proceeding
  15. 15

    A Novel Architecture of Masked Logic Cells for Side-Channel Attacks by Abhishek Kumar, Manoj Sindhwani, Shippu Sachdeva

    ISSN: 2345-377X, 2345-3796
    Published: OICC Press 01.02.2024
    Published in Majlesi Journal of Electrical Engineering (01.02.2024)
    “…Side-channel attacks are attacks against cryptographic devices that are based on information obtained by leakage into cryptographic algorithm hardware implementation rather than algorithm implementation…”
    Get full text
    Journal Article
  16. 16

    Sequential Control Algorithm in the Form of Fuzzy Interpreted Petri Net by Gniewek, L.

    ISSN: 2168-2216, 2168-2232
    Published: New York, NY IEEE 01.03.2013
    “… Hardware implementation of the net, which uses fuzzy RS flip-flops and fuzzy gates, is proposed…”
    Get full text
    Journal Article
  17. 17

    Design and implementation of proposed pipelined adaptive recovery CAMP algorithm for LFMCW radar by Salem, Sameh G.

    ISSN: 1863-1703, 1863-1711
    Published: London Springer London 01.03.2021
    Published in Signal, image and video processing (01.03.2021)
    “…Recently, Compressive Sensing (CS) theory based on the traditional CAMP reconstruction algorithm has applied in radar systems to achieve the benefits of CS…”
    Get full text
    Journal Article
  18. 18

    A study of hardware implementations of the CRC computation algorithms by Mytsko, Evgeniy, Malchukov, Andrey, Ryzova, Svetlana, Kim, Valeriy

    ISSN: 2261-236X, 2274-7214, 2261-236X
    Published: Les Ulis EDP Sciences 2016
    Published in MATEC web of conferences (2016)
    “… The conclusion about the advantages of matrix-driven algorithm hardware implementation, which are a simple diagram is built using only logic «exclusive OR» was done…”
    Get full text
    Journal Article Conference Proceeding
  19. 19

    VLSI implementation of star detection and centroid calculation algorithms for star tracking applications by Azizabadi, Mohsen, Behrad, Alireza, Ghaznavi-Ghoushchi, M. B.

    ISSN: 1861-8200, 1861-8219
    Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.03.2014
    Published in Journal of real-time image processing (01.03.2014)
    “… Hardware implementation of the star tracking algorithm using parallel and pipelined…”
    Get full text
    Journal Article
  20. 20

    Implementación del algoritmo Threefish-256 en hardware reconfigurable by Nieto-Ramírez, Nathaly, Nieto-Londoño, Rubén Darío

    ISSN: 1692-1798, 2339-3483
    Published: Universidad Santo Tomás 31.12.2014
    Published in Iteckne (31.12.2014)
    “…This article  presents  both  the  description and  results  of  the Threefish  cryptographic  algorithm hardware  implementation  for  encryption  process…”
    Get full text
    Journal Article