• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 166
  • 68
  • 44
  • 16
  • 13
  • 13
  • 7
  • 6
  • 3
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 394
  • 55
  • 53
  • 46
  • 46
  • 31
  • 28
  • 28
  • 28
  • 26
  • 26
  • 24
  • 24
  • 23
  • 22
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
131

Energy-Efficient Scalable Serial-Parallel Multiplication Architecture for Elliptic Curve Cryptosystem

Su, Chuan-Shen 25 July 2012 (has links)
In asymmetric cryptosystems, an important advantage of Elliptic Curve Cryptosystem (ECC) is the shorter key lengths than other cryptosystems. It can provide a level of security when the bit length over than 160 bits. So it has become a popular public key cryptographic system in recent year. Multiplier needs to run many times in scalar multiplication and it plays an essential role in ECC. Since the registers in multiplier are shifted every iteration, it will consume a lot of power in the computing process. So in this thesis, we propose five methods to save multiplication¡¦s energy consumption based on a scalable serial-parallel algorithm[1]. The first method is to design a low-power shift-register by modifying shift-register B to reduce the frequency of registers shifted. The second method is to use a frequency divider circuit. It can make registers to access a value every two clock cycles by modifying RA units. The third method is to introduce the gated clock circuit, and the clock signal of register will be disabled if its value is the same. The fourth method is to skip redundant operations and it can decrease the number of clock cycles for completing a multiplication operation. The last method raises multiplier¡¦s throughput by modifying RA units. The former three methods focus on low-power design, and the latter two methods emphasize on improving performance. Reducing power consumption and improving performance will save multiplication¡¦s energy consumption. Finally, we propose a Half Cycles schedule to raise scalar multiplication¡¦s performance. It is based on Montgomery scalar multiplication algorithm with projective coordinate[22][26]. For the hardware implementation, TSMC 0.13um library is employed and all modules are organized in a hierarchy structure. The implementation results show that the proposed multipliers have less energy consumption than traditional multiplier. It can get 5% ~ 24% energy saving. For Montgomery scalar multiplication, it can also reduce 12% ~ 47% energy consumption and is suitable for portable electronic products because its low area complexity and low energy.
132

Scalar Multiplication On Elliptic Curves

Yayla, Oguz 01 August 2006 (has links) (PDF)
Elliptic curve cryptography has gained much popularity in the past decade and has been challenging the dominant RSA/DSA systems today. This is mainly due to elliptic curves offer cryptographic systems with higher speed, less memory and smaller key sizes than older ones. Among the various arithmetic operations required in implementing public key cryptographic algorithms based on elliptic curves, the elliptic curve scalar multiplication has probably received the maximum attention from the research community in the past a few years. Many methods for efficient and secure implementation of scalar multiplication have been proposed by many researchers. In this thesis, many scalar multiplication methods are studied in terms of their mathematical, computational and implementational points.
133

Results On Complexity Of Multiplication Over Finite Fields

Cenk, Murat 01 February 2009 (has links) (PDF)
Let n and l be positive integers and f (x) be an irreducible polynomial over Fq such that ldeg( f (x)) &lt / 2n - 1, where q is 2 or 3. We obtain an effective upper bound for the multiplication complexity of n-term polynomials modulo f (x)^l. This upper bound allows a better selection of the moduli when Chinese Remainder Theorem is used for polynomial multiplication over Fq. We give improved formulae to multiply polynomials of small degree over Fq. In particular we improve the best known multiplication complexities over Fq in the literature in some cases. Moreover, we present a method for multiplication in finite fields improving finite field multiplication complexity muq(n) for certain values of q and n. We use local expansions, the lengths of which are further parameters that can be used to optimize the bounds on the bilinear complexity, instead of evaluation into residue class field. We show that we obtain improved bounds for multiplication in Fq^n for certain values of q and n where 2 &lt / = n &lt / =18 and q = 2, 3, 4.
134

Elliptic Curve Pairing-based Cryptography

Kirlar, Baris Bulent 01 September 2010 (has links) (PDF)
In this thesis, we explore the pairing-based cryptography on elliptic curves from the theoretical and implementation point of view. In this respect, we first study so-called pairing-friendly elliptic curves used in pairing-based cryptography. We classify these curves according to their construction methods and study them in details. Inspired of the work of Koblitz and Menezes, we study the elliptic curves in the form $y^{2}=x^{3}-c$ over the prime field $F_{q}$ and compute explicitly the number of points $#E(mathbb{F}_{q})$. In particular, we show that the elliptic curve $y^{2}=x^{3}-1$ over $mathbb{F}_{q}$ for the primes $q$ of the form $27A^{2}+1$ has an embedding degree $k=1$ and belongs to Scott-Barreto families in our classification. Finally, we give examples of those primes $q$ for which the security level of the pairing-based cryptographic protocols on the curve $y^{2}=x^{3}-1$ over $mathbb{F}_{q}$ is equivalent to 128-, 192-, or 256-bit AES keys. From the implementation point of view, it is well-known that one of the most important part of the pairing computation is final exponentiation. In this respect, we show explicitly how the final exponentiation is related to the linear recurrence relations. In particular, this correspondence gives that finding an algoritm to compute final exponentiation is equivalent to finding an algorithm to compute the $m$-th term of the associated linear recurrence relation. Furthermore, we list all those work studied in the literature so far and point out how the associated linear recurrence computed efficiently.
135

On The Representation Of Finite Fields

Akleylek, Sedat 01 December 2010 (has links) (PDF)
The representation of field elements has a great impact on the performance of the finite field arithmetic. In this thesis, we give modified version of redundant representation which works for any finite fields of arbitrary characteristics to design arithmetic circuits with small complexity. Using our modified redundant representation, we improve many of the complexity values. We then propose new representations as an alternative way to represent finite fields of characteristic two by using Charlier and Hermite polynomials. We show that multiplication in these representations can be achieved with subquadratic space complexity. Charlier and Hermite representations enable us to find binomial, trinomial or quadranomial irreducible polynomials which allows us faster modular reduction over binary fields when there is no desirable such low weight irreducible polynomial in other representations. These representations are very interesting for the NIST and SEC recommended binary fields GF(2^{283}) and GF(2^{571}) since there is no optimal normal basis (ONB) for the corresponding extensions. It is also shown that in some cases the proposed representations have better space complexity even if there exists an ONB for the corresponding extension.
136

On multiplication operators occurring in inverse problems of natural sciences and stochastic finance

Hofmann, Bernd 07 October 2005 (has links) (PDF)
We deal with locally ill-posed nonlinear operator equations F(x) = y in L^2(0,1), where the Fréchet derivatives A = F'(x_0) of the nonlinear forward operator F are compact linear integral operators A = M ◦ J with a multiplication operator M with integrable multiplier function m and with the simple integration operator J. In particular, we give examples of nonlinear inverse problems in natural sciences and stochastic finance that can be written in such a form with linearizations that contain multiplication operators. Moreover, we consider the corresponding ill-posed linear operator equations Ax = y and their degree of ill-posedness. In particular, we discuss the fact that the noncompact multiplication operator M has only a restricted influence on this degree of ill-posedness even if m has essential zeros of various order.
137

Fast algorithms for setting up the stiffness matrix in hp-FEM: a comparison

Eibner, Tino, Melenk, Jens Markus 11 September 2006 (has links) (PDF)
We analyze and compare different techniques to set up the stiffness matrix in the hp-version of the finite element method. The emphasis is on methods for second order elliptic problems posed on meshes including triangular and tetrahedral elements. The polynomial degree may be variable. We present a generalization of the Spectral Galerkin Algorithm of [7], where the shape functions are adapted to the quadrature formula, to the case of triangles/tetrahedra. Additionally, we study on-the-fly matrix-vector multiplications, where merely the matrix-vector multiplication is realized without setting up the stiffness matrix. Numerical studies are included.
138

Étude des algorithmes arithmétiques et leur implémentation matérielle

Bernard, Florent Carlet, Claude. January 2009 (has links) (PDF)
Reproduction de : Thèse de doctorat : Informatique : Paris 8 : 2007. / Titre provenant de l'écran-titre. Bibliogr. p. 133-137.
139

Electron dynamics in nanomaterials for photovoltaic applications by time-resolved two-photon photoemission

Tritsch, John Russell 23 October 2013 (has links)
The impetus of unsustainable consumption coupled with major environmental concerns has renewed our society's investment in new energy production methods. Solar energy is the poster child of clean, renewable energy. Its favorable environmental attributes have greatly enhanced demand resulting in a spur of development and innovation. Photovoltaics, which convert light directly into usable electrical energy, have the potential to transform future energy production. The benefit of direct conversion is nearly maintenance free operation enabling deployment directly within urban centers. The greatest challenge for photovoltaics is competing economically with current energy production methods. Lowering the cost of photovoltaics, specifically through increasing the conversion efficiency of the active absorbing layer, may enable the invisible hand to bypass bureaucracy. To accomplish the ultimate goal of increased efficiency and lowered cost, it is essential to develop new material systems that provide enhanced output or lowered cost with respect to current technologies. However, new materials require new understanding of the physical principles governing device operation. It is my hope that elucidating the dynamics and charge transfer mechanisms in novel photovoltaic material systems will lead to enhanced design principles and improved material selection. Presented is the investigation of electron dynamics in two materials systems that show great promise as active absorbers for photovoltaic applications: inorganic semiconductor quantum dots and organic semiconductors. Common to both materials is the strong Coulomb interaction due to quantum confinement in the former and the low dielectric constant in the latter. The perceived enhancement in Coulomb interaction in quantum dots is believed to result in efficient multiexciton generation (MEG), while discretization of electronic states is proposed to slow hot carrier cooling. Time-resolved two-photon photoemission (TR2PPE) is utilized to directly map out the hot electron cooling and multiplication dynamics in PbSe quantum dots. Hot electron cooling is found to proceed on ultrafast time scales (< 2ps) and carrier multiplication proceeds through an inefficient bulk-like interband scattering. In organic semiconductors, the strong Coulomb interaction leads to bound electron-hole pairs called excitons. TR2PPE is used to monitor the separation of excitons at the model CuPc/C₆₀ interface. Exciton dissociation is determined to proceed through "hot" charge transfer states that set a fundamental time limit on charge separation. TR2PPE is used to investigate charge and energy transfer from organic semiconductors undergoing singlet fission, an analog of multiple exciton generation. The dynamic competition between one and two-electron transfer is determined for the tetracene/C₆₀ and tetracene/CuPc interfaces. These findings allow for the formulation of design principles for the successful harvesting of hot or multiple carriers for solar energy conversion. / text
140

Total delay optimization for column reduction multipliers considering non-uniform arrival times to the final adder

Waters, Ronald S. 26 June 2014 (has links)
Column Reduction Multiplier techniques provide the fastest multiplier designs and involve three steps. First, a partial product array of terms is formed by logically ANDing each bit of the multiplier with each bit of the multiplicand. Second, adders or counters are used to reduce the number of terms in each bit column to a final two. This activity is commonly described as column reduction and occurs in multiple stages. Finally, some form of carry propagate adder (CPA) is applied to the final two terms in order to sum them to produce the final product of the multiplication. Since forming the partial products, in the first step, is simply forming an array of the logical AND's of two bits, there is little opportunity for delay improvement for the first step. There has been much work done in optimizing the reduction stages for column multipliers in the second reduction step. All of the reduction approaches of the second step result in non-uniform arrival times to the input of the final carry propagate adder in the final step. The designs for carry propagate adders have been done assuming that the input bits all have the same arrival time. It is not evident that the non-uniform arrival times from the columns impacts the performance of the multiplier. A thorough analysis of the several column reduction methods and the impact of carry propagate adder designs, along with the column reduction design step, to provide the fastest possible final results, for an array of multiplier widths has not been undertaken. This dissertation investigates the design impact of three carry propagate adders, with different performance attributes, on the final delay results for four column reduction multipliers and suggests general ways to optimize the total delay for the multipliers. / text

Page generated in 0.0482 seconds