期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Enhanced Portable LUT Multiplier with Gated Power Optimization for Biomedical Therapeutic Devices
1
作者 Praveena R 《Computers, Materials & Continua》 SCIE EI 2020年第4期85-95,共11页
Digital design of a digital signal processor involves accurate and high-speed mathematical computation units.DSP units are one of the most power consuming and memory occupying devices.Multipliers are the common buildi... Digital design of a digital signal processor involves accurate and high-speed mathematical computation units.DSP units are one of the most power consuming and memory occupying devices.Multipliers are the common building blocks in most of the DSP units which demands low power and area constraints in the field of portable biomedical devices.This research works attempts multiple power reduction technique to limit the power dissipation of the proposed LUT multiplier unit.A lookup table-based multiplier has the advantage of almost constant area requirement’s irrespective to the increase in bit size of multiplier.Clock gating is usually used to reduce the unnecessary switching activities in idle circlet components.A clock tree structure is employed to enhance the SRAM based lookup table memory architecture.The LUT memory access operation is sequential in nature and instead of address decoder a ring counter is used to scan the memory contents and gated driver tree structure is implemented to control the clock and data switching activities.The proposed algorithm yields 20%of power reduction than existing. 展开更多
关键词 lookup table digital signal processor SRAM FPGA FFT flip flop
下载PDF
Design of Hybrid True Random Number Generator for Cryptographic Applications
2
作者 S.Nithya Devi S.Sasipriya 《Computer Systems Science & Engineering》 SCIE EI 2022年第11期423-437,共15页
In real-time applications,unpredictable random numbers play a major role in providing cryptographic and encryption processes.Most of the existing random number generators are embedded with the complex nature of an amp... In real-time applications,unpredictable random numbers play a major role in providing cryptographic and encryption processes.Most of the existing random number generators are embedded with the complex nature of an amplifier,ring oscillators,or comparators.Hence,this research focused more on implementing a Hybrid Nature of a New Random Number Generator.The key objective of the proposed methodology relies on the utilization of True random number generators.The randomness is unpredictable.The additions of programmable delay lines will reduce the processing time and maintain the quality of randomizing.The performance comparisons are carried out with power,delay,and lookup table.The proposed architecture was executed and verified using Xilinx.The Hybrid TRNG is evaluated under simulation and the obtained results outperform the results of the conventional random generators based on Slices,area and Lookup Tables.The experimental observations show that the proposed Hybrid True Random Number Generator(HTRNG)offers high operating speed and low power consumption. 展开更多
关键词 True random number generators lookup table random number generator digital circuit SEED
下载PDF
A Novel Hybrid Encryption Method Based on Honey Encryption and Advanced DNA Encoding Scheme in Key Generation
3
作者 Nwe Ni Khin Thanda Win 《Journal of Computer and Communications》 2022年第9期22-36,共15页
Nowadays, increased information capacity and transmission processes make information security a difficult problem. As a result, most researchers employ encryption and decryption algorithms to enhance information secur... Nowadays, increased information capacity and transmission processes make information security a difficult problem. As a result, most researchers employ encryption and decryption algorithms to enhance information security domains. As it progresses, new encryption methods are being used for information security. In this paper, a hybrid encryption algorithm that combines the honey encryption algorithm and an advanced DNA encoding scheme in key generation is presented. Deoxyribonucleic Acid (DNA) achieves maximal protection and powerful security with high capacity and low modification rate, it is currently being investigated as a potential carrier for information security. Honey Encryption (HE) is an important encryption method for security systems and can strongly prevent brute force attacks. However, the traditional honeyword encryption has a message space limitation problem in the message distribution process. Therefore, we use an improved honey encryption algorithm in our proposed system. By combining the benefits of the DNA-based encoding algorithm with the improved Honey encryption algorithm, a new hybrid method is created in the proposed system. In this paper, five different lookup tables are created in the DNA encoding scheme in key generation. The improved Honey encryption algorithm based on the DNA encoding scheme in key generation is discussed in detail. The passwords are generated as the keys by using the DNA methods based on five different lookup tables, and the disease names are the input messages that are encoded by using the honey encryption process. This hybrid method can reduce the storage overhead problem in the DNA method by applying the five different lookup tables and can reduce time complexity in the existing honey encryption process. 展开更多
关键词 Honey Encryption DNA Encoding Hybrid Method Data lookup tables Time Complexity Storage Overhead
下载PDF
WBZUC:novel white-box ZUC-128 stream cipher
4
作者 Yang Yatao Zhang Ruoqing +2 位作者 Dong hui Ma Yingjie Zhang Xiaowei 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2023年第2期96-106,共11页
White-box cryptography is critical in a communication system to protect the secret key from being disclosed in a cryptographic algorithm code implementation.The stream cipher is a main dataflow encryption approach in ... White-box cryptography is critical in a communication system to protect the secret key from being disclosed in a cryptographic algorithm code implementation.The stream cipher is a main dataflow encryption approach in mobile communication.However,research work on white-box cryptographic implementation for stream cipher is rare.A new white-box Zu Chongzhi-128(ZUC-128)cryptographic implementation algorithm named WBZUC was proposed.WBZUC adopts lookup table and random coding in the non-linear function to make the intermediate value chaotic without changing the final encryption result.Thus,the WBZUC algorithm’s security gets improved compared with the original ZUC-128 algorithm.As for the efficiency,a test experiment on WBZUC shows that the average speed of key generation,encryption,and decryption can reach at 33.74 kbit/s,23.31 kbit/s,24.06 kbit/s respectively.Despite its running speed is relatively a bit lower than original ZUC-128 algorithm,WBZUC can provide better security and comprehensive performance in mobile communication system environment. 展开更多
关键词 Zu Chongzhi-128(ZUC-128)algorithm white-box cryptography cryptographic implementation lookup table secure communication
原文传递
Latent discriminative representation learning for speaker recognition
5
作者 Duolin HUANG Qirong MAO +3 位作者 Zhongchen MA Zhishen ZHENG Sidheswar ROUTRYAR Elias-Nii-Noi OCQUAYE 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2021年第5期697-708,共12页
Extracting discriminative speaker-specific representations from speech signals and transforming them into fixed length vectors are key steps in speaker identification and verification systems.In this study,we propose ... Extracting discriminative speaker-specific representations from speech signals and transforming them into fixed length vectors are key steps in speaker identification and verification systems.In this study,we propose a latent discriminative representation learning method for speaker recognition.We mean that the learned representations in this study are not only discriminative but also relevant.Specifically,we introduce an additional speaker embedded lookup table to explore the relevance between different utterances from the same speaker.Moreover,a reconstruction constraint intended to learn a linear mapping matrix is introduced to make representation discriminative.Experimental results demonstrate that the proposed method outperforms state-of-the-art methods based on the Apollo dataset used in the Fearless Steps Challenge in INTERSPEECH2019 and the TIMIT dataset. 展开更多
关键词 Speaker recognition Latent discriminative representation learning Speaker embedding lookup table Linear mapping matrix
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部