By Topic

IEE Proceedings - Computers and Digital Techniques

Issue 4 • Jul 1999

Filter Results

Displaying Results 1 - 9 of 9
  • Cryptanalysis of a public key cryptosystem proposed by Wu and Dawson

    Publication Year: 1999, Page(s):185 - 186
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (104 KB)

    This paper cryptanalyses a public key cryptosystem that has recently been proposed by C.K. Wu and E. Dawson (see ibid., vol. 145, no. 5, p. 321-5 (1998)). We show that anyone, knowing only the public key and a ciphertext, can retrieve the corresponding message by using some basic linear algebra View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of a fast radix-4 SRT divider and its VLSI implementation

    Publication Year: 1999, Page(s):205 - 210
    Cited by:  Papers (4)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (592 KB)

    The design of a fast divider is an important issue in high-speed computing. The paper presents a fast radix-4 SRT division architecture. Instead of finding the correct quotient digit, an estimated quotient digit is first speculated. The speculated quotient digit is used to simultaneously compute the two possible partial remainders for the next step while the quotient digit is being corrected. Thus... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic scheme for reducing hot-spot effects in multipath networks

    Publication Year: 1999, Page(s):179 - 184
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (540 KB)

    The presence of hot spots in a multistage interconnection network (MIN) can impair message transmission, increasing average delay time and jeopardising system performance. To reduce the hot-spot impact in the cyclic gamma interconnection network, a MIN design with multiple disjoint paths between every communication pair, a static routing scheme is presented to trim down average system delay time w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Versatile architecture for block matching motion estimation

    Publication Year: 1999, Page(s):188 - 195
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (880 KB)

    A novel architecture for the block matching technique is proposed which can flexibly deal with various sizes of matching block and miscellaneous motion vector prediction modes of the current video coding standards, without extra area and control overhead. The processing element array of the proposed architecture features a separate difference and accumulation unit, considering the balanced delay t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wafer-scale diagnosis tolerating comparator faults

    Publication Year: 1999, Page(s):211 - 215
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (444 KB)

    A promising application of comparison-based system-level diagnosis is the testing of VLSI chips during manufacture. However, existing comparison models essentially overlook the test invalidation owing to the physical faults in the comparators. A comparison model is proposed that takes into account faults affecting the comparators and the syndrome generation circuitry. A comparator test session is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient polarity conversion for large Boolean functions

    Publication Year: 1999, Page(s):197 - 204
    Cited by:  Papers (6)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (656 KB)

    The concept of polarity for canonical sum-of-products (SOP) Boolean functions is introduced. This facilitates efficient conversion between SOP and fixed polarity Reed-Muller (FPRM) forms. New algorithms are presented for the bidirectional conversion between the two paradigms. Multiple segment and multiple pointer techniques are employed to achieve fast conversion for large Boolean functions. Exper... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Correctness of CHW cryptographic key assignment scheme in a hierarchy

    Publication Year: 1999, Page(s):217 - 218
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (124 KB)

    Two counter-examples point out that a CHW cryptographic key assignment scheme in a hierarchy and its two modified versions are impractical or incorrect View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic selection of instruction op-codes of low-power core processors

    Publication Year: 1999, Page(s):173 - 178
    Cited by:  Papers (1)  |  Patents (3)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (580 KB)

    A methodology is presented for automatically determining an assignment of instruction op-codes that guarantees the minimisation of bit transitions occurring inside the registers of the pipeline stages involved in instruction fetching and decoding. The assignment of the binary patterns to the op-codes is driven by the statistics concerning instruction adjacency collected through instruction-level s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extension of CHW cryptographic key assignment scheme in a hierarchy

    Publication Year: 1999
    Cited by:  Papers (4)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (84 KB)

    An extension of the CHW cryptographic key assignment scheme in a hierarchy can defend against attacks using K.J. Tan et al. methods (see ibid., p. 217-8) View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.