137 research outputs found

    Minimal weight digit set conversions

    Get PDF
    Copyright © 2004 IEEEWe consider the problem of recoding a number to minimize the number of nonzero digits in its representation, that is, to minimize the weight of the representation. A general sliding window scheme is described that extends minimal binary sliding window conversion to arbitrary radix and to encompass signed digit sets. This new conversion expresses a number of known recoding techniques as special cases. Proof that this scheme achieves minimal weight for a given digit set is provided and results concerning the theoretical average and worst-case weight are derived.Braden Phillips and Neil Burges

    Complements and signed digit representations: Analysis of a multi-exponentiation-algorithm of Wu, Lou, Lai and Chang

    Full text link
    Wu, Lou, Lai and Chang proposed a multi-exponentiation algorithm using binary complements and the non-adjacent form. The purpose of this paper is to show that neither the analysis of the algorithm given by its original proposers nor that by other authors are correct. In fact it turns out that the complement operation does not have significant influence on the performance of the algorithm and can therefore be omitted

    Zot-Binary: A New Number System And Its Application On Number Theory Based Public-Key Cryptography

    Get PDF
    Kriptosistem Kunci Awam telah digunakan secara meluas dalam protokol seperti pengurusan kekunci, pengesahan, penyulitan kekunci, dan lain-lain. Teori Nombor yang berasaskan Kriptosistem Kunci Awam adalah salah satu cabang utama dalam sistem Kriptografi Kunci Awam. Dua operasi utama dalam Teori Nombor berasaskan Kriptografi Kunci Awam adalah pendaraban dan nombor besar. Antara contoh kriptosistem yang terkenal yang mendapat manfaat daripada operasi ini ialah enkripsi dan dekripsi RSA, tandatangan digital EIGamal, dan pertukaran kunci Diffie-Hellman. Prestasi kriptografi primitif ini sangat bergantung pada kecekapan kedua-dua operasi tersebut. Adalah menjadi sesuatu kebiasaan untuk melakukan penambahbaikan terhadap kecekapan pendaraban dan pengeksponen melalui penggunaan kaedah pengekodan semula atau penggunaan sistem nombor bagi mengurangkan ukuran berat Hamming. ZOT adalah kaedah pengekodan semula yang terkini bagi mengurangkan ukuran berat Hamming. Tetapi, oleh kerana ZOT bukan berasaskan sistem kedudukan nombor, maka kos perlaksanaannya adalah tinggi. Public-key cryptosystems are widely used in protocols such as key agreement, authentication, encryption; etc. Number theory based Public-key cryptosystems are one of the main branches in public-key cryptosystems. The two main operations in number theory based public-key cryptography are large number multiplication and exponentiation. For RSA encryption and decryption, ElGamal digital signature and Diffie-Hellman key exchange are some of the well-known example of these cryptosystems which benefit from these operations. The performance of these cryptographic primitives is highly dependent on the efficiency of these operations. Improving the efficiency of multiplication and exponentiation through the use of a recoding method or utilizing a number system which can decrease the Hamming weight of numbers is very common. ZOT recoding method is one of the latest recoding methods used to decrease the Hamming weight of numbers. However, since it is not positional number systems its cost is high

    Some Optimizations of Hardware Multiplication by Constant Matrices

    Get PDF
    International audienceThis paper presents some improvements on the optimization of hardware multiplication by constant matrices. We focus on the automatic generation of circuits that involve constant matrix multiplication, i.e. multiplication of a vector by a constant matrix. The proposed method, based on number recoding and dedicated common sub-expression factorization algorithms was implemented in a VHDL generator. Our algorithms and generator have been extended to the case of some digital filters based on multiplication by a constant matrix and delay operations. The obtained results on several applications have been implemented on FPGAs and compared to previous solutions. Up to 40% area and speed savings are achieved

    Algorithms and VLSI architectures for parametric additive synthesis

    Get PDF
    A parametric additive synthesis approach to sound synthesis is advantageous as it can model sounds in a large scale manner, unlike the classical sinusoidal additive based synthesis paradigms. It is known that a large body of naturally occurring sounds are resonant in character and thus fit the concept well. This thesis is concerned with the computational optimisation of a super class of form ant synthesis which extends the sinusoidal parameters with a spread parameter known as band width. Here a modified formant algorithm is introduced which can be traced back to work done at IRCAM, Paris. When impulse driven, a filter based approach to modelling a formant limits the computational work-load. It is assumed that the filter's coefficients are fixed at initialisation, thus avoiding interpolation which can cause the filter to become chaotic. A filter which is more complex than a second order section is required. Temporal resolution of an impulse generator is achieved by using a two stage polyphase decimator which drives many filterbanks. Each filterbank describes one formant and is composed of sub-elements which allow variation of the formant’s parameters. A resource manager is discussed to overcome the possibility of all sub- banks operating in unison. All filterbanks for one voice are connected in series to the impulse generator and their outputs are summed and scaled accordingly. An explorative study of number systems for DSP algorithms and their architectures is investigated. I invented a new theoretical mechanism for multi-level logic based DSP. Its aims are to reduce the number of transistors and to increase their functionality. A review of synthesis algorithms and VLSI architectures are discussed in a case study between a filter based bit-serial and a CORDIC based sinusoidal generator. They are both of similar size, but the latter is always guaranteed to be stable

    Key Randomization Countermeasures to Power Analysis Attacks on Elliptic Curve Cryptosystems

    Get PDF
    It is essential to secure the implementation of cryptosystems in embedded devices agains side-channel attacks. Namely, in order to resist differential (DPA) attacks, randomization techniques should be employed to decorrelate the data processed by the device from secret key parts resulting in the value of this data. Among the countermeasures that appeared in the literature were those that resulted in a random representation of the key known as the binary signed digit representation (BSD). We have discovered some interesting properties related to the number of possible BSD representations for an integer and we have proposed a different randomization algorithm. We have also carried our study to the τ\tau-adic representation of integers which is employed in elliptic curve cryptosystems (ECCs) using Koblitz curves. We have then dealt with another randomization countermeasure which is based on randomly splitting the key. We have investigated the secure employment of this countermeasure in the context of ECCs

    Proceedings of the 7th Conference on Real Numbers and Computers (RNC'7)

    Get PDF
    These are the proceedings of RNC7
    corecore