18 research outputs found
Efficient Implementation on Low-Cost SoC-FPGAs of TLSv1.2 Protocol with ECC_AES Support for Secure IoT Coordinators
Security management for IoT applications is a critical research field, especially when taking into account the performance variation over the very different IoT devices. In this paper, we present high-performance client/server coordinators on low-cost SoC-FPGA devices for secure IoT data collection. Security is ensured by using the Transport Layer Security (TLS) protocol based on the TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 cipher suite. The hardware architecture of the proposed coordinators is based on SW/HW co-design, implementing within the hardware accelerator core Elliptic Curve Scalar Multiplication (ECSM), which is the core operation of Elliptic Curve Cryptosystems (ECC). Meanwhile, the control of the overall TLS scheme is performed in software by an ARM Cortex-A9 microprocessor. In fact, the implementation of the ECC accelerator core around an ARM microprocessor allows not only the improvement of ECSM execution but also the performance enhancement of the overall cryptosystem. The integration of the ARM processor enables to exploit the possibility of embedded Linux features for high system flexibility. As a result, the proposed ECC accelerator requires limited area, with only 3395 LUTs on the Zynq device used to perform high-speed, 233-bit ECSMs in 413 µs, with a 50 MHz clock. Moreover, the generation of a 384-bit TLS handshake secret key between client and server coordinators requires 67.5 ms on a low cost Zynq 7Z007S device
Novel Area-Efficient and Flexible Architectures for Optimal Ate Pairing on FPGA
While FPGA is a suitable platform for implementing cryptographic algorithms,
there are several challenges associated with implementing Optimal Ate pairing
on FPGA, such as security, limited computing resources, and high power
consumption. To overcome these issues, this study introduces three approaches
that can execute the optimal Ate pairing on Barreto-Naehrig curves using
Jacobean coordinates with the goal of reaching 128-bit security on the Genesys
board. The first approach is a pure software implementation utilizing the
MicroBlaze processor. The second involves a combination of software and
hardware, with key operations in and being transformed into
IP cores for the MicroBlaze. The third approach builds on the second by
incorporating parallelism to improve the pairing process. The utilization of
multiple MicroBlaze processors within a single system offers both versatility
and parallelism to speed up pairing calculations. A variety of methods and
parameters are used to optimize the pairing computation, including Montgomery
modular multiplication, the Karatsuba method, Jacobean coordinates, the Complex
squaring method, sparse multiplication, squaring in , and
the addition chain method. The proposed systems are designed to efficiently
utilize limited resources in restricted environments, while still completing
tasks in a timely manner.Comment: 13 pages, 8 figures, and 5 table
Preconditioned conjugate gradient methods for absolute value equations
We investigate the NP-hard absolute value equations (AVE), , where are given symmetric matrices in .
By reformulating the AVE as an equivalent unconstrained convex quadratic optimization, we prove that the unique solution of the AVE is the unique minimum of the corresponding quadratic optimization. Then across the latter, we adopt the preconditioned conjugate gradient methods to determining an approximate solution of the AVE.
The computational results show the efficiency of these approaches in dealing with the AVE
Chemical characteristics and cancer risk assessment of smokeless tobacco used in Tunisia (neffa)
Introduction: neffa, a form of air-dried smokeless tobacco used in North Africa, is spuriously perceived as a lower risk alternative to smoking. The objective of this study was to provide information on some harmful constituents of neffa and to use them for cancer risk assessment.
Methods: a high-performance liquid chromatography method coupled with fluorescence detector was used to determine polycyclic aromatic hydrocarbons (PAHs) in one sample of neffa. An atomic absorption spectrometry was performed to determine the concentrations of lead and cadmium in three samples of neffa. The levels of toxicants found in neffa were used to assess for lifetime cancer risk as advocated by the US Environment Protection Agency.
Results: the determination of PAHs in neffa allowed the identification of phenanthrene and anthracene. However, the higher molecular weight PAHs such as Benzo(a)Pyrene (B(a)P) were not detected. The concentrations of cadmium and lead varied between 1.3 to 2.8μg/g and 1.7 to 4.6μg/g respectively. Cancer risk for cadmium and lead varied between 4.2E-03 to 9.3E-03 and 2.5E-06 to 6.4E-06 respectively. Cancer risk for Cd exceeded the range of 10E-04 to 10E-06 of an acceptable risk.
Conclusion: neffa is not a healthy alternative for overcoming smoking addiction. It contains mineral and organic pulmonary toxicants. This study could serve as a scientific basis to inform consumers about the products´ toxicity and help them to quit smokeless tobacco (SLT) use
Preconditioned conjugate gradient methods for absolute value equations
We investigate the NP-hard absolute value equations (AVE), , where are given symmetric matrices in .
By reformulating the AVE as an equivalent unconstrained convex quadratic optimization, we prove that the unique solution of the AVE is the unique minimum of the corresponding quadratic optimization. Then across the latter, we adopt the preconditioned conjugate gradient methods to determining an approximate solution of the AVE.
The computational results show the efficiency of these approaches in dealing with the AVE
Appropriation du discours narratif en langue maternelle et en français par des élèves tunisiens appartenant à deux environnements d'apprentissage (étude longitudinale)
NANTERRE-BU PARIS10 (920502102) / SudocSudocFranceF
Impact of Transportation Costs on the Establishment of an Industrial Symbiosis Network
The challenges related to natural resource depletion and environmental issues stimulate businesses to look for solutions to overcome them. One of the leading strategies that have emerged from the practical implementation of the circular economy concept is industrial symbiosis, which aims to reduce material extraction and consumption by using the waste (co-product) of one company as input for production processes of another company. This study aims to provide a more profound insight into industrial symbiosis (IS) modeling by considering the transport system impact. To this end, a hybrid approach based on agent-based modeling and system dynamics is presented to comprehensively capture the complexity of interactions between companies and their related impacts on transportation. A case study and numerical example are discussed to validate the proposed approach and related model. The results demonstrate that the development of IS, as expected, is significantly influenced by the transport system
Efficient Implementation on Low-Cost SoC-FPGAs of TLSv1.2 Protocol with ECC_AES Support for Secure IoT Coordinators
Security management for IoT applications is a critical research field, especially when taking into account the performance variation over the very different IoT devices. In this paper, we present high-performance client/server coordinators on low-cost SoC-FPGA devices for secure IoT data collection. Security is ensured by using the Transport Layer Security (TLS) protocol based on the TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 cipher suite. The hardware architecture of the proposed coordinators is based on SW/HW co-design, implementing within the hardware accelerator core Elliptic Curve Scalar Multiplication (ECSM), which is the core operation of Elliptic Curve Cryptosystems (ECC). Meanwhile, the control of the overall TLS scheme is performed in software by an ARM Cortex-A9 microprocessor. In fact, the implementation of the ECC accelerator core around an ARM microprocessor allows not only the improvement of ECSM execution but also the performance enhancement of the overall cryptosystem. The integration of the ARM processor enables to exploit the possibility of embedded Linux features for high system flexibility. As a result, the proposed ECC accelerator requires limited area, with only 3395 LUTs on the Zynq device used to perform high-speed, 233-bit ECSMs in 413 µs, with a 50 MHz clock. Moreover, the generation of a 384-bit TLS handshake secret key between client and server coordinators requires 67.5 ms on a low cost Zynq 7Z007S device