نتایج جستجو برای: 32 to 8
تعداد نتایج: 10781943 فیلتر نتایج به سال:
Adders are one of the widely used digital components in digital integrated circuit design. The Carry Select Adder (CSA) provides a good compromise between cost and performance in carry propagation adder design. However, conventional CSA is still area-consuming due to the dual ripple carry adder (RCA) structure. In this paper, modification is done at gate-level to reduce area and power consumpti...
RC4 was designed in 1987 when 8-bit and 16-bit processors were commercially available. Today, most processors use 32-bit or 64bit words but using original RC4 with 32/64 bits is infeasible due to the large memory constraints and the number of operations in the key scheduling algorithm. In this paper we propose a new 32/64-bit RC4like keystream generator. The proposed generator produces 32 or 64...
Traditional Computer Science curriculum focuses on the training for logic reasoning and programming skills. System integration are often not covered in most computer science curricula. As the embedded platforms migrate from 8-bit microprocessors to 32-bit microprocessors, the engineers require different skills to design modern embedded systems. The Computer Science faculty at several universiti...
This paper presents NORX8 and NORX16, the 8-bit and 16-bit versions of the authenticated cipher NORX, one of the CAESAR candidates. These new versions are better suited for low-end systems—such as “internet of things” devices—than the original 32-bit and 64-bit versions: whereas 32-bit NORX requires 64 bytes of RAM or cache memory, NORX8 and NORX16 require just 16 and 32 bytes, respectively. Bo...
OBJECTIVES To explore the urine bactericidal activity of co-amoxiclav and norfloxacin against Escherichia coli in an in vitro pharmacodynamic model simulating the human urinary concentrations observed after administration of a single oral dose of 2000/125 mg sustained-release co-amoxiclav and 400 mg norfloxacin. METHODS Six E. coli isolates exhibiting amoxicillin/clavulanic acid MICs of 4/2 (...
We obtain new restrictions on the linear programming bound for sphere packing, by optimizing over spaces of modular forms to produce feasible points in dual program. In contrast situation dimensions 8 8</m...
Algebraic side-channel attack (ASCA) is a powerful cryptanalysis technique different from conventional side-channel attacks. This paper studies ASCA from three aspects: enhancement, analysis and application. To enhance ASCA, we propose a generic method, called Multiple Deductions-based ASCA (MDASCA), to cope the multiple deductions caused by inaccurate measurements or interferences. For the fir...
This paper presents Multiply and Accumulate (MAC) unit design using Vedic Multiplier, which is based on Urdhva Tiryagbhyam Sutra. The paper emphasizes an efficient 32-bit MAC architecture along with 8-bit and 16-bit versions and results are presented in comparison with conventional architectures. The efficiency in terms of area and speed of proposed MAC unit architecture is observed through red...
Embedded computer systems are changing more than other computing environments since the scope of their application domain is expanding. Once embedded system development was largely focused on 8-bit, standalone systems written directly in assembly or C. These systems were characterized by slow CPUs and kilobytes of memory. Now they are embracing ever-widening application domains to include not o...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید