• Title/Summary/Keyword: Implementation Table

Search Result 410, Processing Time 0.023 seconds

Optimized Implementation of Lightweight Block Cipher PIPO Using T-Table (T-table을 사용한 경량 블록 암호 PIPO의 최적화 구현)

  • Minsig Choi;Sunyeop Kim;Insung Kim;Hanbeom Shin;Seonggyeom Kim;Seokhie Hong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.391-399
    • /
    • 2023
  • In this paper, we presents for the first time an implementation using T-table for PIPO-64/128, 256 which are lightweight block ciphers. While our proposed implementation requires 16 T-tables, we show that the two types of T-tables are circulant and obtain variants implementations that require a smaller number of T-tables. We then discuss trade-off between the number of required T-tables (code size) and throughput by evaluating the throughput of the variant implementations on an Intel Core i7-9700K processor. The throughput-optimized versions for PIPO-64/128, 256 provide better throughput than TLU(Table-Look-Up) reference implementation by factors of 3.11 and 2.76, respectively, and bit-slice reference implementation by factors of 3.11 and 2.76, respectively.

FPGA Implementation of Riindael Algorithm according to the Three S-box Implementation Methods (Rijndael S-box의 세 가지 구현 방법에 따른 FPGA 설계)

  • 이윤경;박영수;전성익
    • Proceedings of the IEEK Conference
    • /
    • 2002.06b
    • /
    • pp.281-284
    • /
    • 2002
  • Rijndael algorithm is known to a new private key block cipher which is substitute for DES. Rijndael algorithm is adequate to both hardware and software implementation, so hardware implementation of Rijndael algorithm is applied to high speed data encryption and decryption. This paper describes three implementation methods of Rijndael S-box, which is important factor in performance of Rijndael coprocessor. It shows synthesis results of each S-box implementation in Xilinx FPGA. Tllc lilree S-box implementation methods are implementation using lookup table only, implementation using both lookup table and combinational logic, and implementation using combinational logic only.

  • PDF

A Component Transformation Technique based on Model for Composition of EJB and COM+ (EJB와 COM+ 결합을 위한 모델기반 컴포넌트 변환 기법)

  • 최일우;신정은;류성열
    • Journal of KIISE:Software and Applications
    • /
    • v.30 no.12
    • /
    • pp.1172-1184
    • /
    • 2003
  • At present, new techniques based on different component reference models for the integration of component and system of different platforms, such as EJB and COM+, are introduced. The operation between the components in the identical component platform is realized by the composition at the source level. In case of the different component platform, however, it is impossible to use combined components in real condition although they are components of similar domain. In this paper we proposed a solution for the composition problem by using component transformation methodology based on model between EJB and COM+ components which are different components. For the composition between EJB and COM+ components, we compared and analyzed each reference model, then proposed the Virtual Component Model which is implementation independent and the Implementation Table for the mutual conversion. Reffering to the Virtual Component Model and the Implementation Table, we can generalize each Implementation model to the Virtual Component Model, make the Virtual Component Model which is implementation independent through the virtual component modeling, transform EJB and COM+ components selectively. Proposing the effective Model Transformation method to the different component platform, we can combine EJB and COM+ components.

A White-box Implementation of SEED

  • Kim, Jinsu
    • Journal of Advanced Information Technology and Convergence
    • /
    • v.9 no.2
    • /
    • pp.115-123
    • /
    • 2019
  • White-box cryptography is an implementation technique in order to protect secret keys of cryptographic algorithms in the white-box attack model, which is the setting that an adversary has full access to the implementation of the cryptographic algorithm and full control over their execution. This concept was introduced in 2002 by Chow et al., and since then, there have been many proposals for secure implementations. While there have been many approaches to construct a secure white-box implementation for the ciphers with SPN structures, there was no notable result about the white-box implementation for the block ciphers with Feistel structure after white-box DES implementation was broken. In this paper, we propose a secure white-box implementation for a block cipher SEED with Feistel structure, which can prevent the previous known attacks for white-box implementations. Our proposal is simple and practical: it is performed by only 3,376 table lookups during each execution and the total size of tables is 762.5 KB.

VHDL implementation of IP over ATM protocol (IP over ATM 프로토콜의 VHDL 구현)

  • 최병태;최준균;김재근;고성제
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.34S no.1
    • /
    • pp.26-35
    • /
    • 1997
  • In this paper, a VHDL implementation method for the internet protocol (IP) placed on top of ATM, so called IP over ATM, is presented. The proposed implementation method employs a parallel processing architecture to reduce the processing time and offers 155.52Mbps (STM-1) interface with the full-duplex mode for the ATM-based network. Furthermore, in order to minimize the search time for the table look-up, a LANCAM-based structure combining the routing table with the ATMARP table is proposed. The VHDL simulation results show that this proposed method can transmit (receive) at 155.52Mbps with delays of 48.5 clocks (29.5clocks).

  • PDF

Implementation of new gestures on the Multi-touch table

  • Park, Sang Bong;Kim, Beom jin
    • International Journal of Advanced Culture Technology
    • /
    • v.1 no.1
    • /
    • pp.15-18
    • /
    • 2013
  • This paper describes new gestures on the Multi-touch table. The 2 new gestures with 3 fingers are used for minimizing of all windows that is already open and converting Aero mode. We also implement a FTIR (Frustrated Total Internal Reflection) Multi-touch table that consists of sheet of acrylic, infrared LEDs, camera and rear projector. The operation of proposed gestures is verified on the implemented Multi-touch table.

  • PDF

Implementation of Information Retrieval System by Table-parsing (Table parsing을 이용한 정보검색시스템의 효율향상)

  • 김영순;권혁철
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2001.11a
    • /
    • pp.413-416
    • /
    • 2001
  • 인터넷 문서에서 구조정보의 대표적인 예라 할 수 있는 표(table)는 의미있는 정보를 가지고 있는 경우가 많다. 하지만 인터넷상의 표는 여러 가지 형태이며, 이것에 맞게 표를 효과적으로 parsing하는 방법이 필요하다. 이렇게 parsing한 표의 정보를 이용하여, 인터넷 문서, 특히 전자상거래 문서에 있는 표를 표준화한 틀에 따라 개념화하여, 의미있는 정보를 추출해 낼 수 있다.

  • PDF

Design and Implementation of Shaking Table using Stepping Motor (스테핑 모터를 이용한 진동대의 설계 및 구현)

  • Jeong, Hyung-Il;Choi, Jai-Hoon;Hong, Kyu-Jang
    • Proceedings of the KIEE Conference
    • /
    • 1997.07b
    • /
    • pp.488-490
    • /
    • 1997
  • This study is focused on the design and performance test of shaking table using stepping motor. Stepping motor can control the motion accurately with generated pulses and is applied to the shaking table. Earthquakes like El Centro and Taft are used as inputs to the shaking table. First, the number of pulses are calculated and sent to pulse generator. Then, the generator controls the table according to the pulse signs. It is shown that the measured signals from the table are in very good agreement with input signals of scale-downed earthquakes of El Centro and Taft. This table will be used for the experimental study of small-scaled building structures with tuned mass dampers under earthquakes.

  • PDF

CRC8 Implementation using Direct Table Algorithm (테이블 기반 알고리즘을 이용한 CRC8의 구현)

  • Seo, Seok-Bae;Kim, Young-Sun;Park, Jong-Euk;Kong, Jong-Phil;Yong, Sang-Soon;Lee, Seung-Hoon
    • Aerospace Engineering and Technology
    • /
    • v.13 no.2
    • /
    • pp.38-46
    • /
    • 2014
  • CRC (Cyclic Redundancy Codes) is a error detection method for the date transmission, which is applied to the GRDDP (GOES-R Reliable Data Delivery Protocol) between satellite and GEMS (Geostationary Environmental Monitoring Sensor) on the GEO-KOMPSAT 2B development. This paper introduces a principle of the table based CRC, and explains software implementation results of the CRC8 applied to GEMS.

Implementation of SGML Basic Parser (SGML(Standardized Genernal Markup Language)에 대한 기본 파서의 구현)

  • 홍은선;정회경;이수연
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.17 no.5
    • /
    • pp.495-508
    • /
    • 1992
  • This paper describes on implementation of SGML(Standardized General Markup Language )parser, which can analize SGML documents and its DTD(Document Type Deflnitton) defined according to the SGML( ISO 8879) .We have constructed a yacc definition file to present the rules of SGML DTD and documents, by which incoming SGML DTD and documents can be parsed Into the appropriate tokens. with the tokens a database with the stuctures such as entity table, element table and so on is built to vali-date the logical structure of the inconung SGML documents. The additional functions of this parser Include the automatic transforminng of the incoming documents with the short references into the complete SGML documents. Several test SGML documents have tested to clarify an implementation of this parser and experimental results are satisfactory.

  • PDF