Based on the requirements of applying information technology to reform the traditional fashion industry,the method of fashion merchandising management in some medium-sized enterprises is discussed. By analyzing the ac...Based on the requirements of applying information technology to reform the traditional fashion industry,the method of fashion merchandising management in some medium-sized enterprises is discussed. By analyzing the actual domestic fashion industry environment, ideal model that could quickly respond to the market's changes is proposed which includes naming brand, target-market position, circumstances analysis and popularity anticipation, brand concept and style setting, fashion design, fashion category component, and sale strategy.展开更多
RSA and ellipse curve cryptography(ECC)algorithms are widely used in authentication,data security,and access control.In this paper,we analyze the basic operation of the ECC and RSA algorithms and optimize their modula...RSA and ellipse curve cryptography(ECC)algorithms are widely used in authentication,data security,and access control.In this paper,we analyze the basic operation of the ECC and RSA algorithms and optimize their modular multiplication and modular inversion algorithms.We then propose a reconfigurable modular operation architecture,with a mix-memory unit and double multiply-accumulate structures,to realize our unified,asymmetric cryptosystem structure in an operational unit.Synthesized with 55-nm CMOS process,our design runs at 588 MHz and requires only 437801µm2 of hardware resources.Our proposed design takes 21.92 and 23.36 mW for 2048-bit RSA modular multiplication and modular inversion respectively,as well as 16.16 and 15.88 mW to complete 512-bit ECC dual-field modular multiplication and modular inversion respectively.It is more energy-efficient and flexible than existing single algorithm units.Compared with existing multiple algorithm units,our proposed method shows better performance.The operation unit is embedded in a 64-bit RISC-V processor,realizing key generation,encryption and decryption,and digital signature functions of both RSA and ECC.Our proposed design takes 0.224 and 0.153 ms for 256-bit ECC point multiplication in G(p)and G(2^(m))respectively,as well as 0.96 ms to complete 1024-bit RSA exponentiation,meeting the demand for high energy efficiency.展开更多
Tomita-Takesaki theory in the real case is considered. The author introduces the conception of a nondegenerate pair of closed subspaces in a real Hilbert space. Then a satisfactory real Tomita-Taksaki theory is obtain...Tomita-Takesaki theory in the real case is considered. The author introduces the conception of a nondegenerate pair of closed subspaces in a real Hilbert space. Then a satisfactory real Tomita-Taksaki theory is obtained, and it seems to be a special result of the complex case.展开更多
基金the national education ministry key research project 02107.
文摘Based on the requirements of applying information technology to reform the traditional fashion industry,the method of fashion merchandising management in some medium-sized enterprises is discussed. By analyzing the actual domestic fashion industry environment, ideal model that could quickly respond to the market's changes is proposed which includes naming brand, target-market position, circumstances analysis and popularity anticipation, brand concept and style setting, fashion design, fashion category component, and sale strategy.
文摘RSA and ellipse curve cryptography(ECC)algorithms are widely used in authentication,data security,and access control.In this paper,we analyze the basic operation of the ECC and RSA algorithms and optimize their modular multiplication and modular inversion algorithms.We then propose a reconfigurable modular operation architecture,with a mix-memory unit and double multiply-accumulate structures,to realize our unified,asymmetric cryptosystem structure in an operational unit.Synthesized with 55-nm CMOS process,our design runs at 588 MHz and requires only 437801µm2 of hardware resources.Our proposed design takes 21.92 and 23.36 mW for 2048-bit RSA modular multiplication and modular inversion respectively,as well as 16.16 and 15.88 mW to complete 512-bit ECC dual-field modular multiplication and modular inversion respectively.It is more energy-efficient and flexible than existing single algorithm units.Compared with existing multiple algorithm units,our proposed method shows better performance.The operation unit is embedded in a 64-bit RISC-V processor,realizing key generation,encryption and decryption,and digital signature functions of both RSA and ECC.Our proposed design takes 0.224 and 0.153 ms for 256-bit ECC point multiplication in G(p)and G(2^(m))respectively,as well as 0.96 ms to complete 1024-bit RSA exponentiation,meeting the demand for high energy efficiency.
文摘Tomita-Takesaki theory in the real case is considered. The author introduces the conception of a nondegenerate pair of closed subspaces in a real Hilbert space. Then a satisfactory real Tomita-Taksaki theory is obtained, and it seems to be a special result of the complex case.