نتایج جستجو برای: netlist encryption

تعداد نتایج: 27942  

Journal: :Research Journal of Information Technology 2014

2013
Ayman Mousa Osama S. Faragallah E. M. Nigm

Encryption provides strong security for databases. To develop a database encryption strategy, many factors must be taken into consideration. Organizations must balance between the requirement for security and the desire for excellent performance. In this paper a novel encryption algorithm is proposed “Reverse Encryption Algorithm (REA)”. The proposed algorithm REA is simple and yet leads to a c...

2000
David Marín Juan Escudero Joan Oliver Denis Flandre

This paper presents a new open environment for the design of analog circuits exchanging information from existing tools. The main features of these tools have been extended in CONNAN by means of a netlist analyzer, the interaction with a commercial CAD tool and a transistor model manager that solves some common problems of sizing tools based on electrical simulators. As an initial test CONNAN i...

2013
V. S. V. Prabhakar K. Lal Kishore

Due to Technology scaling the importance of leakage power has significantly increased in the modern day system-on-chip devices. The runtime leakage component during the active state is almost becoming equal to the standby leakage component. Hence Present day research is more focused on reduction of runtime leakage current .we present a novel runtime leakage reduction for 70nm technology. As an ...

2000
Robert D. Turney Chris Dick David B. Parlour James Hwang

Recent developments in the simulation capabilities of high level mathematical modeling tools have opened exciting new design flow possibilities. System level support for bit true modeling enables a designer to use a single environment to create floating and fixedpoint models, and to make scaling and rounding decisions early in the design process. At the same time, FPGA vendors have expanded com...

2012
Saurabh Sharma Pushpendra Kumar Pateriya

Omnipresence of security in every application in Internet application is a clear motivation to contribute in the field of Information Security. Security is one of the most challenging aspects in the internet and network applications. Encryption is a process which is used to secure the data and the Encryption algorithms play a crucial role in efficient information security systems. Full encrypti...

2009
Jonathan Katz Arkady Yerukhimovich

Predicate encryption is a recent generalization of identitybased encryption (IBE), broadcast encryption, attribute-based encryption, and more. A natural question is whether there exist black-box constructions of predicate encryption based on generic building blocks, e.g., trapdoor permutations. Boneh et al. (FOCS 2008) recently gave a negative answer for the specific case of IBE. We show both n...

2001
Hendrik Hartje Ingmar Neumann Dominik Stoffel Wolfgang Kunz

We present new concepts to integrate logic synthesis and physical design. Our methodology uses general Boolean transformations as known from technology-independent synthesis, and a recursive bi-partitioning placement algorithm. In each partitioning step, the precision of the layout data increases. This allows effective guidance of the logic synthesis operations for cycle time optimization. An a...

1994
Wayne Luk David Ferguson

A major bottleneck in automatic hardware synthesis is the time to place and route the netlist produced by a hardware compiler. This paper presents a method which exploits the syntax of the source program to guide its layout in a deviceindependent manner. The technique has been used in prototyping a hardware compiler for a commercially-available device, the Algotronix CAL1024 FieldProgrammable G...

1999
Morteza Fayyazi Zainalabedin Navabi Armita Peymandoust

VHDL models for neural networks for automatic test generation of gate level circuits are presented in this paper. A program converts a gate netlist to its equivalent neural model. A good circuit and faultable bad circuits will be generated. A VHDL test bench has been developed to apply the faults to the neural network bad circuit model, and report tests that are generated for each injected fault.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید