Zobrazeno 1 - 10
of 75
pro vyhledávání: '"Ku-Young Chang"'
Space Efficient $GF(2^m)$ Multiplier for Special Pentanomials Based on $n$ -Term Karatsuba Algorithm
Publikováno v:
IEEE Access, Vol 8, Pp 27342-27360 (2020)
Recently, new multiplication schemes over the binary extension field GF(2m) based on an n-term Karatsuba algorithm have been proposed for irreducible trinomials. In this paper, we extend these schemes for trinomials to any irreducible polynomials. We
Externí odkaz:
https://doaj.org/article/ba391f2954334f7abf850a2492266664
Publikováno v:
IEEE Access, Vol 8, Pp 173491-173507 (2020)
Recently, hybrid multiplication schemes over the binary extension field $GF(2^{m})$ based on $n$ -term Karatsuba algorithm (KA) have been proposed for irreducible trinomials. Their complexities depend on a decomposition of $m$ and the choice of a gen
Externí odkaz:
https://doaj.org/article/70fbca0e60ac43e98eae7319ae38a59d
Publikováno v:
IEEE Access, Vol 7, Pp 27047-27064 (2019)
We propose bit-parallel GF(2m) multipliers for irreducible trinomials using an n-term Karatsuba algorithm and Mastrovito approach, which are generalizations of the newly proposed multiplication scheme for a specific trinomial. The complexities of the
Externí odkaz:
https://doaj.org/article/8a5672dbef2a4bd08ce36da3f338199e
Publikováno v:
IEEE Access, Vol 6, Pp 26578-26587 (2018)
At present, there is a considerable increase in the amount of data stored in storage services, along with dramatic evolution of networking techniques. In storage services with huge data, the storage servers may want to reduce the volume of stored dat
Externí odkaz:
https://doaj.org/article/2c7968915a234ebc924fc78c351d1ee1
Publikováno v:
Energies, Vol 13, Iss 11, p 2742 (2020)
Deduplication of encrypted data is a significant function for both the privacy of stored data and efficient storage management. Several deduplication techniques have been designed to provide improved security or efficiency. In this study, we focus on
Externí odkaz:
https://doaj.org/article/687155cff4ea4cd6a59fee51fa3dc63f
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 9 (2013)
PP-1 is a scalable block cipher which can be implemented on a platform with limited resource. In this paper, we analyze the security of PP-1 by using truncated differential cryptanalysis. As concrete examples, we consider four versions of PP-1, PP-1/
Externí odkaz:
https://doaj.org/article/2f3e183ff0c949dd961a446b03b43fc5
Publikováno v:
IEEE Access, Vol 8, Pp 173491-173507 (2020)
Recently, hybrid multiplication schemes over the binary extension field $GF(2^{m})$ based on $n$ -term Karatsuba algorithm (KA) have been proposed for irreducible trinomials. Their complexities depend on a decomposition of $m$ and the choice of a gen
Space Efficient $GF(2^m)$ Multiplier for Special Pentanomials Based on $n$ -Term Karatsuba Algorithm
Publikováno v:
IEEE Access, Vol 8, Pp 27342-27360 (2020)
Recently, new multiplication schemes over the binary extension field $GF(2^{m})$ based on an $n$ -term Karatsuba algorithm have been proposed for irreducible trinomials. In this paper, we extend these schemes for trinomials to any irreducible polynom
Publikováno v:
IEEE Access. 7:27047-27064
We propose bit-parallel GF(2 m ) multipliers for irreducible trinomials using an n-term Karatsuba algorithm and Mastrovito approach, which are generalizations of the newly proposed multiplication scheme for a specific trinomial. The complexities of t
Publikováno v:
IEEE Access, Vol 7, Pp 27047-27064 (2019)
We propose bit-parallel GF(2m) multipliers for irreducible trinomials using an n-term Karatsuba algorithm and Mastrovito approach, which are generalizations of the newly proposed multiplication scheme for a specific trinomial. The complexities of the