By Topic

IEE Proceedings - Computers and Digital Techniques

Issue 5 • Sep 1995

Filter Results

Displaying Results 1 - 12 of 12
  • Efficient computation of quaternary fixed polarity Reed-Muller expansions

    Publication Year: 1995, Page(s):345 - 352
    Cited by:  Papers (15)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (468 KB)

    A new fast algorithm for constructing the whole polarity coefficient matrices of fixed polarity Reed-Muller expansions over Galois Field GF(4) has been introduced. The matrices are generated in a recursive way making the algorithm computationally very effective in terms of basic field operations. The number of required additions and multiplications is advantageous when compared to the known Green'... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reliability of semiconductor RAMs with soft-error scrubbing techniques

    Publication Year: 1995, Page(s):337 - 344
    Cited by:  Papers (22)  |  Patents (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (440 KB)

    Error control codes are widely used to improve the reliability of random-access memory (RAM) systems. The paper evaluates the reliability of coded memory systems suffering both hard (permanent) errors and soft (transient) errors. The technique of soft error scrubbing, that is periodically removing all soft errors to improve the system reliability, is studied for RAM systems with chip-level coding ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhancing the security of El Gamal's signature scheme

    Publication Year: 1995
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (48 KB)

    J. He and T. Kiesler (1994) proposed a digital signature scheme to embed both the discrete logarithm problem and the factorisation problem in the processing of signing to enhance the security of the original El Gamal signature scheme (1985). The purpose of this comment is to show that the security of the signature scheme is not as secure as they have claimed View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Matsumoto and Imai human identification scheme

    Publication Year: 1995, Page(s):313 - 317
    Cited by:  Papers (2)  |  Patents (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (288 KB)

    At Eurocrypt'91, Matsumoto and Imai presented a human identification scheme suitable for the human ability of memorising and processing a short secret. It protects against an intruder peeping as a user enters authentication information on a terminal connected to the authentication server. In this paper several attacks are discussed to investigate the security of their scheme. A modified scheme is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Lower bound study on interconnect complexity of the decomposed finite state machines

    Publication Year: 1995, Page(s):332 - 336
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (292 KB)

    Various strategies for multiway general decomposition have been investigated in the past. These strategies differ in how they reflect the cost of a logic level implementation. In the paper the authors are concerned with the lower bound on the number of interconnecting wires that must exist when a machine is decomposed into several submachines. From a VLSI implementation point of view, having a cos... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Non-exhaustive method for identification of optimal variable orderings in the decomposition of complex logic functions

    Publication Year: 1995, Page(s):373 - 375
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (240 KB)

    An analysis is presented to predict the input variable subsets that give efficient disjunctive decompositions of complex combinatorial logic functions. A substantially smaller number of possible solutions, compared to all possible solutions, is predicted using a comparatively simple analysis, based on a count of the covers between tuples in the function description when one or two variables are sw... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Two parallel paths in incomplete hypercubes

    Publication Year: 1995, Page(s):353 - 359
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (508 KB)

    Previous routeing algorithms for incomplete hypercubes deal only with single-path routeing and fail to take advantage of the flexibility provided by incomplete hypercubes. The authors present a simple effective routeing algorithm that forwards messages through two parallel paths between a pair of nodes in any incomplete hypercube with an even number of nodes. This algorithm proves to be deadlock-f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Techniques for ASIC implementation of vector control

    Publication Year: 1995, Page(s):318 - 324
    Cited by:  Papers (3)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (484 KB)

    Harmonic-free vector control, in which both the phase and amplitude of a three-phase current are controlled digitally to within close limits, is a common requirement in many power conversion applications. These include the control of three-phase motors, and the conversion of electrical power from three-phase AC to DC, or the inverse, with low supply harmonic content. Vector control at a specified ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Weighted BIST structures in the arithmetic unit of a communication processor

    Publication Year: 1995, Page(s):360 - 366
    Cited by:  Patents (2)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (396 KB)

    BIST structures using CAR and LFSR have shown important progress in the last few years as ASIC design styles have changed from (purely small) flattened standard cells to large hierarchical designs based on multiple module types: ALUs, RAMs, ROMs etc. The weighted self/test reduces the length of test experiments and gives an improvement in the BIST operation if it is possible to implement a weighte... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recursive relationships, fast transforms, generalisations and VLSI iterative architecture for Gray code ordered Walsh functions

    Publication Year: 1995, Page(s):325 - 331
    Cited by:  Papers (9)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (488 KB)

    Two Walsh transforms in Gray code ordering are introduced. The generation of two Walsh transforms in Gray code ordering from the binary code is shown. Recursive relationship between higher and lower matrix orders for Gray code ordering of Walsh functions, using the concepts of operator matrices with symmetric and shift copy, are developed. The generalisation of the introduced Gray code ordered Wal... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cheating detection and cheater identification in secret sharing schemes

    Publication Year: 1995, Page(s):367 - 369
    Cited by:  Papers (8)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (180 KB)

    A threshold scheme for secret sharing can protect a secret with high reliability and flexibility. These advantages can be achieved only when all the participants are honest, i.e. all the participants willing to pool their shadows shall always present the true ones. Cheating detection is an important issue in the secret sharing scheme. However, cheater identification is more effective than cheating... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The security of He and Kiesler's signature schemes

    Publication Year: 1995, Page(s):370 - 372
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (140 KB)

    He and Kiesler (1994) proposed two modified schemes to enhance the security of El Gamal's signature scheme (1985). They claimed to have remedied two technical problems of El Gamal's signature scheme, and the security of the second scheme is based on the difficulty of solving both factoring and discrete logarithms simultaneously. The paper shows that both modified schemes, in fact, do not solve the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.