• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 54
  • 9
  • 5
  • 4
  • 4
  • 3
  • 1
  • Tagged with
  • 101
  • 101
  • 37
  • 37
  • 25
  • 22
  • 21
  • 20
  • 18
  • 15
  • 14
  • 12
  • 12
  • 11
  • 10
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

A comparison of circuit implementations from a security perspective

Sundström, Timmy January 2005 (has links)
<p>In the late 90's research showed that all circuit implementations were susceptible to power analysis and that this analysis could be used to extract secret information. Further research to counteract this new threat by adding countermeasures or modifying the nderlaying algorithm only seemed to slow down the attack.</p><p>There were no objective analysis of how different circuit implementations leak information and by what magnitude.</p><p>This thesis will present such an objective comparison on five different logic styles. The comparison results are based on simulations performed on transistor level and show that it is possible to implement circuits in a more secure and easier way than what has been previously suggested.</p>
32

Energy Efficiency Analysis and Implementation of AES on an FPGA

Kenney, David January 2008 (has links)
The Advanced Encryption Standard (AES) was developed by Joan Daemen and Vincent Rjimen and endorsed by the National Institute of Standards and Technology in 2001. It was designed to replace the aging Data Encryption Standard (DES) and be useful for a wide range of applications with varying throughput, area, power dissipation and energy consumption requirements. Field Programmable Gate Arrays (FPGAs) are flexible and reconfigurable integrated circuits that are useful for many different applications including the implementation of AES. Though they are highly flexible, FPGAs are often less efficient than Application Specific Integrated Circuits (ASICs); they tend to operate slower, take up more space and dissipate more power. There have been many FPGA AES implementations that focus on obtaining high throughput or low area usage, but very little research done in the area of low power or energy efficient FPGA based AES; in fact, it is rare for estimates on power dissipation to be made at all. This thesis presents a methodology to evaluate the energy efficiency of FPGA based AES designs and proposes a novel FPGA AES implementation which is highly flexible and energy efficient. The proposed methodology is implemented as part of a novel scripting tool, the AES Energy Analyzer, which is able to fully characterize the power dissipation and energy efficiency of FPGA based AES designs. Additionally, this thesis introduces a new FPGA power reduction technique called Opportunistic Combinational Operand Gating (OCOG) which is used in the proposed energy efficient implementation. The AES Energy Analyzer was able to estimate the power dissipation and energy efficiency of the proposed AES design during its most commonly performed operations. It was found that the proposed implementation consumes less energy per operation than any previous FPGA based AES implementations that included power estimations. Finally, the use of Opportunistic Combinational Operand Gating on an AES cipher was found to reduce its dynamic power consumption by up to 17% when compared to an identical design that did not employ the technique.
33

A comparison of circuit implementations from a security perspective

Sundström, Timmy January 2005 (has links)
In the late 90's research showed that all circuit implementations were susceptible to power analysis and that this analysis could be used to extract secret information. Further research to counteract this new threat by adding countermeasures or modifying the nderlaying algorithm only seemed to slow down the attack. There were no objective analysis of how different circuit implementations leak information and by what magnitude. This thesis will present such an objective comparison on five different logic styles. The comparison results are based on simulations performed on transistor level and show that it is possible to implement circuits in a more secure and easier way than what has been previously suggested.
34

Energy Efficiency Analysis and Implementation of AES on an FPGA

Kenney, David January 2008 (has links)
The Advanced Encryption Standard (AES) was developed by Joan Daemen and Vincent Rjimen and endorsed by the National Institute of Standards and Technology in 2001. It was designed to replace the aging Data Encryption Standard (DES) and be useful for a wide range of applications with varying throughput, area, power dissipation and energy consumption requirements. Field Programmable Gate Arrays (FPGAs) are flexible and reconfigurable integrated circuits that are useful for many different applications including the implementation of AES. Though they are highly flexible, FPGAs are often less efficient than Application Specific Integrated Circuits (ASICs); they tend to operate slower, take up more space and dissipate more power. There have been many FPGA AES implementations that focus on obtaining high throughput or low area usage, but very little research done in the area of low power or energy efficient FPGA based AES; in fact, it is rare for estimates on power dissipation to be made at all. This thesis presents a methodology to evaluate the energy efficiency of FPGA based AES designs and proposes a novel FPGA AES implementation which is highly flexible and energy efficient. The proposed methodology is implemented as part of a novel scripting tool, the AES Energy Analyzer, which is able to fully characterize the power dissipation and energy efficiency of FPGA based AES designs. Additionally, this thesis introduces a new FPGA power reduction technique called Opportunistic Combinational Operand Gating (OCOG) which is used in the proposed energy efficient implementation. The AES Energy Analyzer was able to estimate the power dissipation and energy efficiency of the proposed AES design during its most commonly performed operations. It was found that the proposed implementation consumes less energy per operation than any previous FPGA based AES implementations that included power estimations. Finally, the use of Opportunistic Combinational Operand Gating on an AES cipher was found to reduce its dynamic power consumption by up to 17% when compared to an identical design that did not employ the technique.
35

From Benchmarking View to distinguish the Competition Strategy of Taiwan Steel Industry

Chin, Wei 29 July 2006 (has links)
Steel industry has a great connection with the strategic superiority of a nation, and is so called ¡§the foundation of industry¡¨. Generally speaking, the development of steel industry makes progress with economy and society of a country at the same time. Both developed and developing country, positively constructed their own steel industry to meet their demand. From 2001, there was a insufficient gap of steel supply existed in the world due to strong demand of Mainland China and consequently made world steel price rise sharply and hit historical high time after time. But the capacity of steel production also followed fast in Mainland China, and finally the central bureau of P.R.C. execute macro-adjustment plan in order to cooling down overheated economy. In 2005 first quarter the steel products oversupply eventually, and the price reverse V-TYPE down. Focus on the enormous chance, the leader steel company of Japan and South Korea entered Mainland China steel industry by strategic alliance with Mainland¡¦s steel companies. Formosa Plastics in Taiwan also schemed to establish an integrated steel mill. The steel market varied so fast and was hard to prospect, Taiwan¡¦s largest steel company -China Steel Corp. operated in such complicated environment, should find a new position to keep its advantageous competition status and do some contribution to its country.
36

A Research of IPE Theories of Susan Strange

Hung, Shiou-Wen 14 August 2003 (has links)
Abstract Susan Strange who is British, female, a master and a mother of six children. This woman can be one of us but who has much rich life than anyone. She is foundation of IPE of British, and foundation of British International Studies Association (BISA), and who also is one of two non-American chairmen of American International Relations Association (ISA) in 20 century. She also visits many countries worldwide American, European, Asia and Australia areas for promote her ideas of IPE, which should be an open field for each subject of Social Science, and the research approach should be multi-value and multi-approach. Even in such busy life, Strange still published lots articles and books, and the ideas also spirit lots people who is contemporary with her or later. Strange is a representative of IPE in 20 century. Strange¡¦s Structural Power Analysis has become a framework of many IPE textbooks and her New Diplomacy also point out a new trend of Diplomacy. In the overseas, the research of her is important and popular. But in Taiwan, We can¡¦t find any research about her and her theories; even some articles may be mention about her name or her theory parts. Therefore, A research of theories of Strange is essential and important work for research circle of IPE in Taiwan. That is what this Article tries to aim at, and hope can provoke responses. So, the person, her life and authors are first thing we should know, and then her ideas of what is IPE subject. Of Course, her theories, which are Structural Power Analysis, New Diplomacy and what is hegemony and who¡¦s duty in International Society, is what the main point of this article. I regard the three main concepts of her theories are risks, structures and Values. So, this article also develop by ¡§Risk Occur¡¨ ¡÷ ¡§Structures Change¡¨ ¡÷ ¡§Values Change¡¨ ¡÷ ¡§Risk Occur¡¨.
37

SCHOOL LUNCH PROGRAMS AND THE AMERICAN DIET: EXPLORING A CONTESTED FOOD TERRAIN

Som Castellano, Rebecca 01 January 2009 (has links)
This study examines the social actors and issues involved in constructing and contesting the National School Lunch Program (NSLP), in order to identify whose interests are involved in shaping an institution which transmits dietary habits and food knowledge to the nation’s children through the mid day meal. For the historical analysis, I collected data from historical accounts of the NSLP, congressional hearings, laws, and newspaper articles. For the contemporary analysis, I interviewed 15 actors representing organizations key to federal NLSP policy making. To frame my analysis, I utilize a model of power, based on the work of Arts and Van Tatenhove (2004), and the work of Burstein (1991), who describes issue creation and movement in policy domains. The key findings of this study are that actors with the most financial resources (e.g. the food industry) do not automatically achieve their interests in the policy making process. In fact, at key times of contestation, economically powerful actors form alliances and adjust their agenda in reaction to the use of other forms of power by economically weaker actors. This information can help economically weaker actors (e.g. the farm to school movement) understand how to increase their influence in the policy domain.
38

On studying Whitenoise stream-cipher against Power Analysis Attacks

Zakeri, Babak 17 December 2012 (has links)
This report describes the works done since May 2010 to December 2012 on breaking Whitenoise encryption algorithm. It is mainly divided into two sections: Studying the stream-cipher developed by Whitenoise lab and its implementation on a FPGA against certain group of indirect attacks called Power Analysis Attacks, and reviewing the process of development and results of experiments applied on a power sampling board which was developed during this project. For the first part the algorithm and the implementation would be reverse engineered and reviewed. Various blocks of the implementation would be studied one by one against some indirect attacks. It would be shown that those attacks are useless or at least very weak against Whitenoise. A new scenario would then be proposed to attack the implementation. An improvement to the new scenario would also be presented to completely hack the implementation. However it would also be shown that the complete hack requires very accurate equipment, large number of computations and applying a lot of tests and thus Whitenoise seems fairly strong against this specific group of attacks. In the next section the requirements of a power consumption measurement setup would be discussed. Then the motivations and goals of building such a board would be mentioned. Some important concepts and consideration in building the board, such as schematic of the amplifier, multilayer designing, embedding a BGA component, star grounding, inductance reduction, and other concepts would be presented. Then the results of applied tests on the produced board would be discussed. The precision of the measurements, some pattern recognition along with some other results would be illustrated. Also some important characteristics such as linearity of measurements would be investigated and proved to exist. In the end some topics as possible future works, such as more pattern recognition, or observing the effect of masks on the power consumption would be suggested. / Graduate
39

A Monte Carlo study of several alpha-adjustment procedures using a testing multiple hypotheses in factorial anova

An, Qian. January 2010 (has links)
Thesis (Ph.D.)--Ohio University, June, 2010. / Title from PDF t.p. Includes bibliographical references.
40

A Monte Carlo study of power analysis of hierarchical linear model and repeated measures approaches to longitudinal data analysis

Fang, Hua. January 2006 (has links)
Thesis (Ph.D.)--Ohio University, August, 2006. / Title from PDF t.p. Includes bibliographical references.

Page generated in 0.0661 seconds