• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 2
  • 2
  • 1
  • Tagged with
  • 5
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

A Cell-Based Design Solution of 4x8 Scanning Decoder Using RC5 Protocol for Wireless Handsets and A High-Performance Current Sense Amplifiers for SRAMs

Huang, Yi-An 26 June 2002 (has links)
The first topic of this thesis is a cell-based design solution of 4¡Ñ8 scanning decoder using RC5 protocol for DECT handsets. It is a keypad scanner ASIC without any embedded microprocessor nor internal ROMs. The keypad scanner uses RC5 transfer protocol which is compatible with remote control and wireless handsets. The keypad scanner built in the handsets must meet the requirement of low power consumption and small die size to avoid shortening the battery lift and increasing chip cost. The proposed ASIC design possesses both of the required advantages. The second topic is a high-performance SRAM using current sense amplifier. Current sensing in SRAMs is very promising method to achieve high speed operations in low-voltage applications. This topic present a current sense amplifier circuit as well as its simulation results.
2

Inteligentní elektroinstalace a použití mikrokontrolérů Atmel AVR / The intelligent wiring and application of Atmel AVR microcontrollers

VOLF, Jiří January 2013 (has links)
The aim of the thesis is to explain and introduce the indiviudal components and control proceedings in the systems of automatic control of intelligent houses. The thesis is divided into three parts. In the first part I deal with the general description and structure of the house automatic systems, their availability and application in wiring practise. The second part is focused on the proceedings used in RC5 infra-red area and the most used X10 PowerLine protocol and its processing by AVR microprocessors. The third part is concentrated on the practical construction of a module with a microprocessor enabling the development and education of user applications for the substance of the automation system and that extend it in other possibilities of communication such as ethernet and WiFi networks, eventually GSM mobile network.
3

Low Power Half-Run RC5 Cipher Circuit for Portable Biomedical Device and A Frequency-Shift Readout Circuit for FPW-Based Biosensors

Lin, Yain-Reu 08 August 2011 (has links)
This thesis consists of two topics. We proposed a low power half-run RC5 cipher for portable biomedical devices in the first part of this thesis. The second topic is to realize a frequency-shift readout system for FPW-based biosensors. In the first topic, a half-round low-power RC5 encryption structure is proposed. To reduce hardware cost as well as power consumption, the proposed RC5 cipher adopts a resource-sharing approach, where only one adder/subtractor, one bi-directional barrel shifter, and one XOR with 32-bit bus width are used to carry out the entire design. Two data paths are switched through the combination of four multiplexers in the encryption/decryption procedure. For the sake of power reduction, the clock in the key expansion can be turned off when all subkeys are generated. In the second topic, an IgE antigen concentration measurement system using a frequency-shift readout method for a two-port FPW (flexural plate-wave) allergy biosensor is presented. The proposed frequency-shift readout method adopts a peak detecting scheme to detect the resonant frequency. A linear frequency generator, a pair of peak detectors, two registers, and an subtractor are only needed in our system. According to the characteristics of the FPW allergy biosensor, the frequency sweep range is limited in a range of 2 MHz to 4 MHz. The precision of the measured frequency is proved to the 4.2 kHz/mV, which is for better than that of existing designs.
4

Propagation Characteristics Of Rc5, Rc6 And Twofish Ciphers

Arikan, Savas 01 January 2004 (has links) (PDF)
In this thesis, two finalists of the AES (Advanced Encryption Standard) contest, RC6 developed by Rivest et al, Twofish proposed by Schneier et al, and preceding algorithm of RC6 cipher, RC5, are studied. The strength of ciphers to cryptanalytic attacks is measured according to different criteria. The studied evaluation criteria are the avalanche criterion and its derivations. After theimplementation of the algorithms and the test procedures, they are compared with each other. Different test criteria, including avalanche criterion, avalanche weight distribution (AWD) for randomness of RC5, RC6 and Twofish algorithms are applied / and the S-boxes of the Twofish algorithm are analyzed according to nonlinearity criterion. The avalanche criteria results of RC6 and Twofish are compared with NIST (National Institute of Standards and Technology) Statistical Test Suite results.
5

Security in Cloud Storage : A Suitable Security Algorithm for Data Protection

Oduyiga, Adeshola Oyesanya January 2018 (has links)
The purpose of this thesis work was to conduct a general research on existing security techniques and come up with a considerable algorithm for data security in cloud storage. Cloud storage is an infrastructure or is a model of computer data storage in which the digital data is stored in logical pools. It unifies object storage for both developers and enterprises, from live applications data to cloud archival. It help to save valuable space on PC computers or mobile devices and provides the easy storage and access of data anywhere in the world. However, just as the benefits of cloud computing abounds, so also are the risks involved. If data are not well secured or encrypted before deployment for storage in the cloud, in case of negligence on the side of the developers, then hackers can gain unauthorized access to the data. The behavior of existing security algorithms on data were studied, the encryption and decryption process of the each algorithm on data was studied and also their weaknesses against attacks. Apart from data encryption, security policies also plays an important roll in cloud storage which was also covered in this report. The research work was conducted through the use of online publications, literature review, books, academic publications and reputable research materials. The study showed that regardless of the challenges in cloud storage, there is still a suitable algorithm for protecting data against attack in the cloud.

Page generated in 0.163 seconds