Zobrazeno 1 - 10
of 32
pro vyhledávání: '"Chi Jeng Chang"'
Publikováno v:
ICCE-TW
This paper presents a binocular eye tracking device which used 2-D regression-based method to avoid the complicated vector calculations, often applied in geometry-based 3-D tracking, to increase processing speed. It is probably due to the speed incre
Publikováno v:
Procedia Engineering. 29:2848-2852
8-bit AES implementation was first proposed in 2006 as Application Specific Instruction Processer (ASIP). [1] It featured in low area design, for the increasing popular applications in wireless and embedded devices, based on the stored-program concep
Publikováno v:
2013 International Conference on System Science and Engineering (ICSSE).
This paper presents an 8-bit AES direct FPGA hardware implementation of CFB/OFB operations without using the Block RAM (BRAM). The 8-bit AES core is then embedded through a microcontroller to interface with Bluetooth wireless for performing encryptio
Publikováno v:
IAS
This paper presents the applications of Advanced Encryption Standard (AES) in audio and video signals. Like the ciphertext is completely different from the plaintext in AES operation, so the encrypted audio or visual signal should have the same effec
Publikováno v:
2010 5th IEEE Conference on Industrial Electronics and Applications.
This paper presents an application of AES (Advanced Encryption Standard) operations in image encryption and decryption. The encrypted cipher images always display the uniformly distributed RGB pixels. It looks like the noise of TV without signals. Ho
Publikováno v:
ISCAS
Advance Encryption Standard (AES) hardware implementation in FPGA as well as in ASIC has been intensely discussing, especially in high-throughput over several tens Giga bit per second (Gbps). However, lower throughput and low area designs have also b
Publikováno v:
APCCAS
Advance Encryption Standard (AES) hardware implementation in FPGA as well as in ASIC has been intensely discussing, especially in high-throughput (over several tens Gbps). However, low area designs have also been investigated in recent years for the
Publikováno v:
The First International Symposium on Data, Privacy, and E-Commerce (ISDPE 2007).
Network games have become a popular social experience, while problem of in-game cheat (e.g. trade cheat, fraud and so on) has not an effective solution by now. It is reasonable to believe that cheaters and normal players have low group interactions w
Publikováno v:
The First International Symposium on Data, Privacy, and E-Commerce (ISDPE 2007).
In Pere-to-Peer network, trust and reputation mechanism can be used to build trust in peers for choosing the suitable peer to collaborate with. Aim at solving the problem that the traditional concentrated trust method can not be used in P2P networks,
Publikováno v:
The First International Symposium on Data, Privacy, and E-Commerce (ISDPE 2007).
A 32-bit AES implementation is proposed in small Xilinx FPGA chip (Spartan-3 XC3S200). It uses 148 slices, 11 block RAMs (BRAMs) and achieves a throughput of 647 mega bits per second ( Mbps) at 278 MHz working frequency. It achieve 3 times improvemen