• Title/Summary/Keyword: binary field

Search Result 285, Processing Time 0.026 seconds

Construction of Jacket Matrices Based on q-ary M-sequences (q-ary M-sequences에 근거한 재킷 행렬 설계)

  • S.P., Balakannan;Kim, Jeong-Ki;Borissov, Yuri;Lee, Moon-Ho
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.7
    • /
    • pp.17-21
    • /
    • 2008
  • As with the binary pseudo-random sequences q-ary m-sequences possess very good properties which make them useful in many applications. So we construct a class of Jacket matrices by applying additive characters of the finite field $F_q$ to entries of all shifts of q-ary m-sequence. In this paper, we generalize a method of obtaining conventional Hadamard matrices from binary PN-sequences. By this way we propose Jacket matrix construction based on q-ary M-sequences.

New Light Curves and Orbital Period Investigations of the Interacting Binary System UV Piscium

  • Jeong, Min-Ji;Han, Wonyong;Kim, Chun-Hwey;Yoon, Joh-Na;Kim, Hyoun-Woo
    • Journal of Astronomy and Space Sciences
    • /
    • v.36 no.2
    • /
    • pp.75-86
    • /
    • 2019
  • UV Psc is a typical RS CVn type system undergoing dynamic chromosphere activity. We performed photometric observations of the system in 2015 and secured new BVR light curves showing well-defined photometric waves. In this paper, we analyzed the light curves using Wilson-Devinney binary code and investigated the orbital period of the system. The combination of our light curve synthesis with the spectroscopic solution developed by previous investigators yielded the absolute parameters as: $M_1=1.104{\pm}0.042M_{\odot}$, $R_1=1.165{\pm}0.025R_{\odot}$, and $L_1=1.361{\pm} 0.041L_{\odot}$ for the primary star, and $M_2=0.809{\pm}0.082M_{\odot}$, $R_2=0.858{\pm}0.018R_{\odot}$, and $L_2=0.339 {\pm}0.010L_{\odot}$ for the secondary star. The eclipse timing diagram for accurate CCD and photoelectric timings showed that the orbital period may vary either in a downward parabolic manner or a quasi-sinusoidal pattern. If the latter is adopted as a probable pattern for the period change, a more plausible account for the cyclic variation may be the light time effect caused by a circumbinary object rather than an Applegate-mechanism occurring via variable surface magnetic field strengths.

Efficient Serial Gaussian Normal Basis Multipliers over Binary Extension Fields

  • Kim, Yong-Tae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.4 no.3
    • /
    • pp.197-203
    • /
    • 2009
  • Finite field arithmetic is very important in the area of cryptographic applications and coding theory, and it is efficient to use normal bases in hardware implementation. Using the fact that $GF(2^{mk})$ having a type-I optimal normal basis becomes the extension field of $GF(2^m)$, we, in this paper, propose a new serial multiplier which reduce the critical XOR path delay of the best known Reyhani-Masoleh and Hasan's serial multiplier by 25% and the number of XOR gates of Kwon et al.'s multiplier by 2 based on the Reyhani-Masoleh and Hasan's serial multiplier for type-I optimal normal basis.

  • PDF

Development of Digital Particle Holographic System for Measurements of the Characteristics of Spray Droplets (분무 액적 특성 계측을 위한 디지털 입자 홀로그래피 시스템의 개발)

  • Yan, Yang;Kang, Bo-Seon
    • Journal of ILASS-Korea
    • /
    • v.15 no.2
    • /
    • pp.53-60
    • /
    • 2010
  • This study presents development of digital particle holographic system and its application to spray field to measure three-dimensional velocities and sizes of spray droplets. A double exposure hologram recording system with synchronization system for time control was established and digital holograms can be recorded in a short time interval. To process recorded holograms, the correlation coefficient method was used for focal plane determination of particles. To remove noises and improve the quality of holograms and reconstructed images, the Wiener filter was adopted. The two-threshold and image segmentation methods were used in binary image transformation. For particle pairing, the match probability method was adopted. The developed system was applied to spray field and three-dimensional velocities and sizes of spray droplets were measured. The measurement results of digital holographic system were compared with those made by laser instruments, PDPA(Phase Doppler Particle Analyzer), which proved the feasibility of in-line digital particle holographic system as a good measurement tool for spray droplets.

Efficient Hardware Montgomery Modular Inverse Module for Elliptic Curve Cryptosystem in GF(p) (GF(p)의 타원곡선 암호 시스템을 위한 효율적인 하드웨어 몽고메리 모듈러 역원기)

  • Choi, Piljoo;Kim, Dong Kyue
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.2
    • /
    • pp.289-297
    • /
    • 2017
  • When implementing a hardware elliptic curve cryptosystem (ECC) module, the efficient design of Modular Inverse (MI) algorithm is especially important since it requires much more computation than other finite field operations in ECC. Among the MI algorithms, binary Right-Shift modular inverse (RS) algorithm has good performance when implemented in hardware, but Montgomery Modular Inverse (MMI) algorithm is not considered in [1, 2]. Since MMI has a similar structure to that of RS, we show that the area-improvement idea that is applied to RS is applicable to MMI, and that we can improve the speed of MMI. We designed area- and speed-improved MMI variants as hardware modules and analyzed their performance.

A Software Implementation of The Elliptic Curve Digital Signature Algorithm on a Embedded System (임베디드 시스템에서의 ECDSA(Elliptic Curve Digital Signature Algorithm) 구현)

  • Kim, Hyeon-Ik;Kim, Yong-Min;Jeong, Seok-Won;Lee, Sang-Jin;Jeong, Chang-Hun
    • Proceedings of the KIEE Conference
    • /
    • 2003.11c
    • /
    • pp.1014-1017
    • /
    • 2003
  • In this paper, after the crypto acceleration board of the server-termination type is designed, we implement the Elliptic Curve Digital Signature Algorithm on the board that serves data integrity and user authentication. For implementing ECDSA, we use crypto co-processor, MPC180, to reduce the computation burden of main Processor (MPC860) on the board. By using crypto co-processor, the computation efficiency in case prime field is improved more between 90 and 100 times than the software library and between 20 and 90 times in case binary field. Our result is expect to apply for SSL acceleration board.

  • PDF

EFFECT OF THE ADDITION OF Ni ON GIANT MAGNETORESISTANCE OF Cu-Co AGED RIBBONS

  • Kim, I.J.;Echigoya, J.;Fukamichi, K.;Shimada, Y.
    • Journal of the Korean Magnetics Society
    • /
    • v.5 no.5
    • /
    • pp.456-460
    • /
    • 1995
  • Giant magnetoresistance(GMR) of $Cu_{85-x}Co_{15}Ni_{x}$ melt-spu ribbons is closely correlated with the microstructure produced by the spinodal decomposition. The solid solution range is extanded by the replacement of Cu by Ni in the as-quenched state. The wavelengths obtained by subsequent isothermal aging in Cu-Co-Ni ribbons are shorter than those in Cu-Co binary ribbons, resulting in the increase of the surface-to-volume ratio. The largest MR ratio of 8 % in high field has been achieved in the $Cu_{80}Co_{15}Ni_{5}$ aged ribbon. The field dependence of MR ratio in low fields becomes larger with the Ni content.

  • PDF

Low area field-programmable gate array implementation of PRESENT image encryption with key rotation and substitution

  • Parikibandla, Srikanth;Alluri, Sreenivas
    • ETRI Journal
    • /
    • v.43 no.6
    • /
    • pp.1113-1129
    • /
    • 2021
  • Lightweight ciphers are increasingly employed in cryptography because of the high demand for secure data transmission in wireless sensor network, embedded devices, and Internet of Things. The PRESENT algorithm as an ultralightweight block cipher provides better solution for secure hardware cryptography with low power consumption and minimum resource. This study generates the key using key rotation and substitution method, which contains key rotation, key switching, and binary-coded decimal-based key generation used in image encryption. The key rotation and substitution-based PRESENT architecture is proposed to increase security level for data stream and randomness in cipher through providing high resistance to attacks. Lookup table is used to design the key scheduling module, thus reducing the area of architecture. Field-programmable gate array (FPGA) performances are evaluated for the proposed and conventional methods. In Virtex 6 device, the proposed key rotation and substitution PRESENT architecture occupied 72 lookup tables, 65 flip flops, and 35 slices which are comparably less to the existing architecture.

A Clustering Algorithm for Handling Missing Data (손실 데이터를 처리하기 위한 집락분석 알고리즘)

  • Lee, Jong Chan
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.11
    • /
    • pp.103-108
    • /
    • 2017
  • In the ubiquitous environment, there has been a problem of transmitting data from various sensors at a long distance. Especially, in the process of integrating data arriving at different locations, data having different property values of data or having some loss in data had to be processed. This paper present a method to analyze such data. The core of this method is to define an objective function suitable for the problem and to develop an algorithm that can optimize this objective function. The objective function is used by modifying the OCS function. MFA (Mean Field Annealing), which was able to process only binary data, is extended to be applicable to fields with continuous values. It is called CMFA and used as an optimization algorithm.

A Study of Reliability of Guided Missile(◯◯) using Probit Analysis (Probit 분석을 이용한 ◯◯유도탄 신뢰도 분석 및 활용방안)

  • Hong, SeokJin;Jung, SangHoon
    • Journal of Korean Society for Quality Management
    • /
    • v.44 no.3
    • /
    • pp.553-564
    • /
    • 2016
  • Purpose: The purpose of this study was to propose useful suggestions by analyzing reliability of guided missile using field data in Military industry. Methods: The collected data from Defense industry company and the military were analyzed using probit analysis which is non-linear model because field data contain binary variable. Results: The results of this study are as follows; It was found that the effect of time was significant. It takes about 12.4 years when 10st percentile of guided missiles are not working and it takes about 18.6 years when 50st percentile of guided missiles are not working. It was found that period between 10years to 15years comes less than reliability 0.0. Conclusion: Periodical check needs to extend from 4 year to 10 year partially. Early LOT need to check per 4 year and follow-up LOT extend the period of check to 10 year by reflecting the result of reliability.