Search Results - "algorithm hardware implementation"
-
1
Minimum-clock-cycle Itoh-Tsujii algorithm hardware implementation for cryptography applications over GF (2 m ) fields
ISSN: 0013-5194, 1350-911XPublished: Stevenage Institution of Engineering and Technology 30.08.2012Published in Electronics letters (30.08.2012)Get full text
Journal Article -
2
Minimum-clock-cycle Itoh-Tsujii algorithm hardware implementation for cryptography applications over GF(2^sup m^) fields
ISSN: 0013-5194, 1350-911XPublished: Stevenage John Wiley & Sons, Inc 30.08.2012Published in Electronics letters (30.08.2012)“…Inversion over finite fields is the most costly basic operation for diverse cryptographic applications, such as elliptic curve cryptography and others. The…”
Get full text
Journal Article -
3
Local Interpolation-based Polar Format SAR: Algorithm, Hardware Implementation and Design Automation
ISSN: 1939-8018, 1939-8115Published: Boston Springer US 01.06.2013Published in Journal of signal processing systems (01.06.2013)“…In this paper we present a local interpolation-based variant of the well-known polar format algorithm used for synthetic aperture radar (SAR) image formation…”
Get full text
Journal Article -
4
AES Encryption Algorithm Hardware Implementation: Throughput and Area Comparison of 128, 192 and 256-bits Key
ISSN: 2089-4864, 2089-4864Published: 01.07.2012Published in International journal of reconfigurable and embedded systems (01.07.2012)“…Advanced Encryption Standard (AES) adopted by the National Institute of Standards and Technology (NIST) to replace existing Data Encryption Standard (DES), as…”
Get full text
Journal Article -
5
AES Encryption Algorithm Hardware Implementation: Throughput and Area Comparison of 128, 192 and 256-bits Key
ISSN: 2089-4864, 2089-4864Published: Yogyakarta IAES Institute of Advanced Engineering and Science 01.07.2012Published in International journal of reconfigurable and embedded systems (01.07.2012)“…Advanced Encryption Standard (AES) adopted by the National Institute of Standards and Technology (NIST) to replace existing Data Encryption Standard (DES), as…”
Get full text
Journal Article -
6
AES Encryption Algorithm Hardware Implementation Architecture: Resource and Execution Time Optimization
ISSN: 2089-3299, 2089-3299Published: Yogyakarta IAES Institute of Advanced Engineering and Science 16.06.2012Published in International journal of information and network security (16.06.2012)“…In the present paper we present an architecture to implement Advanced Encryption Standard (AES) Rijndael algorithm in reconfigurable hardware. Rijndael…”
Get full text
Journal Article -
7
Parallel Smith-Waterman Algorithm Hardware Implementation for Ancestors and Offspring Gene Tracer
Published: IEEE 01.03.2016Published in 2016 World Symposium on Computer Applications & Research (WSCAR) (01.03.2016)“…Computational Molecular Biology, Bioinformatics and Genomics are the most intriguing sciences to understand the human genome and diseases. These sciences use…”
Get full text
Conference Proceeding -
8
Vehicle image edge detection algorithm hardware implementation on FPGA
ISBN: 9781424472352, 1424472350ISSN: 2161-9069Published: IEEE 01.10.2010Published in 2010 International Conference on Computer Application and System Modeling (ICCASM 2010) (01.10.2010)“…This paper use System Generator tool and modular construction methods to build a image algorithm platform in MATLAB R2007a, so as to Implement edge detection…”
Get full text
Conference Proceeding -
9
Implementation of Real-Time Space Target Detection and Tracking Algorithm for Space-Based Surveillance
ISSN: 2072-4292, 2072-4292Published: Basel MDPI AG 01.06.2023Published in Remote sensing (Basel, Switzerland) (01.06.2023)“…Space-based target surveillance is important for aerospace safety. However, with the increasing complexity of the space environment, the stellar target and…”
Get full text
Journal Article -
10
Application of soft computing techniques for maximum power point tracking of SPV system
ISSN: 0038-092X, 1471-1257Published: New York Elsevier Ltd 01.01.2017Published in Solar energy (01.01.2017)“…Conventional maximum power point tracking (MPPT) algorithms fails to track peak power from a solar photovoltaic panel (SPV) effectively under rapidly changing…”
Get full text
Journal Article -
11
An 11.2-pJ/bit Reconfigurable Dynamic Chaotic Encryption ASIC for IoT
ISSN: 2327-4662, 2327-4662Published: Piscataway IEEE 01.12.2024Published in IEEE internet of things journal (01.12.2024)“…Chaotic encryption is applied as a lightweight symmetric cryptography in Internet of Things (IoT). In symmetric encryption, system security depends on the…”
Get full text
Journal Article -
12
Implementation of Sobel operator based image edge detection on FPGA
ISSN: 2214-7853, 2214-7853Published: Elsevier Ltd 2021Published in Materials today : proceedings (2021)“… In Sobel edge detection algorithm hardware implementation is chosen because it can work with less decline in noise at high level…”
Get full text
Journal Article -
13
Hardware Design and Implementation of a Lightweight Saber Algorithm Based on DRC Method
ISSN: 2079-9292, 2079-9292Published: Basel MDPI AG 03.06.2023Published in Electronics (Basel) (03.06.2023)“…). To address the problems of long delay and the high power consumption of Saber algorithm hardware implementation, a lightweight Saber algorithm hardware design scheme based on the joint optimization…”
Get full text
Journal Article -
14
Active Fences against Voltage-based Side Channels in Multi-Tenant FPGAs
ISSN: 1558-2434Published: IEEE 01.11.2019Published in Digest of technical papers - IEEE/ACM International Conference on Computer-Aided Design (01.11.2019)“… However, they require significant efforts and tailoring for a specific algorithm, hardware implementation and mapping…”
Get full text
Conference Proceeding -
15
A Novel Architecture of Masked Logic Cells for Side-Channel Attacks
ISSN: 2345-377X, 2345-3796Published: OICC Press 01.02.2024Published in Majlesi Journal of Electrical Engineering (01.02.2024)“…Side-channel attacks are attacks against cryptographic devices that are based on information obtained by leakage into cryptographic algorithm hardware implementation rather than algorithm implementation…”
Get full text
Journal Article -
16
Sequential Control Algorithm in the Form of Fuzzy Interpreted Petri Net
ISSN: 2168-2216, 2168-2232Published: New York, NY IEEE 01.03.2013Published in IEEE transactions on systems, man, and cybernetics. Systems (01.03.2013)“… Hardware implementation of the net, which uses fuzzy RS flip-flops and fuzzy gates, is proposed…”
Get full text
Journal Article -
17
Design and implementation of proposed pipelined adaptive recovery CAMP algorithm for LFMCW radar
ISSN: 1863-1703, 1863-1711Published: London Springer London 01.03.2021Published in Signal, image and video processing (01.03.2021)“…Recently, Compressive Sensing (CS) theory based on the traditional CAMP reconstruction algorithm has applied in radar systems to achieve the benefits of CS…”
Get full text
Journal Article -
18
A study of hardware implementations of the CRC computation algorithms
ISSN: 2261-236X, 2274-7214, 2261-236XPublished: Les Ulis EDP Sciences 2016Published in MATEC web of conferences (2016)“… The conclusion about the advantages of matrix-driven algorithm hardware implementation, which are a simple diagram is built using only logic «exclusive OR» was done…”
Get full text
Journal Article Conference Proceeding -
19
VLSI implementation of star detection and centroid calculation algorithms for star tracking applications
ISSN: 1861-8200, 1861-8219Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.03.2014Published in Journal of real-time image processing (01.03.2014)“… Hardware implementation of the star tracking algorithm using parallel and pipelined…”
Get full text
Journal Article -
20
Implementación del algoritmo Threefish-256 en hardware reconfigurable
ISSN: 1692-1798, 2339-3483Published: Universidad Santo Tomás 31.12.2014Published in Iteckne (31.12.2014)“…This article presents both the description and results of the Threefish cryptographic algorithm hardware implementation for encryption process…”
Get full text
Journal Article

