نتایج جستجو برای: netlist encryption

تعداد نتایج: 27942  

2016

In Minecraft, circuits can be assembled from redstone components. We introduce PERSHING, a place and route tool that can transform a gate-level netlist into logic gates built of redstone in Minecraft, without the need for external Minecraft mods. We discuss challenges, such as vertical signal transmission, and the algorithms used to perform placement and routing. We show preliminary results, in...

Journal: :IPSJ Trans. System LSI Design Methodology 2010
Jason Cong Guojie Luo

The task of 3D physical design is to map a circuit from a netlist (structural) representation into a geometric (physical) representation according to a specific 3D IC technology with multiple active device layers. This paper discusses the recent progress made on the major steps in 3D physical design, including 3D floorplanning, 3D placement, 3D routing and thermal through-silicon via (TS via) p...

This paper mainly focused on implementation of AES encryption and decryption standard AES-128. All the transformations of both Encryption and Decryption are simulated using an iterativedesign approach in order to minimize the hardware consumption. This method can make it avery low-complex architecture, especially in saving the hardware resource in implementing theAES InverseSub Bytes module and...

In this paper, we propose a new framework for joint encryption encoding scheme based on polar codes, namely efficient and secure joint secret key encryption channel coding scheme. The issue of using new coding structure, i.e. polar codes in Rao-Nam (RN) like schemes is addressed. Cryptanalysis methods show that the proposed scheme has an acceptable level of security with a relatively smaller ke...

Journal: :Int. Arab J. Inf. Technol. 2013
Ayman Mousa Osama S. Faragallah S. El-Rabaie Elsayed Nigm

Database encryption is a well established technology for protecting sensitive data. Unfortunately, the integration of existing encryption techniques with database systems causes undesirable performance degradation. It is a crucial technique in the security mechanisms of database. In this paper we propose a new encryption algorithm, which we call Reverse Encryption Algorithm (REA). Our new encry...

2009
Alexander W. Dent

Certificateless encryption is a form of public-key encryption that is designed to eliminate the disadvantages of both traditional PKIbased public-key encryption scheme and identity-based encryption. Unlike public-key encryption, there is no requirement for digital certificates or a public-key infrastructure. Unlike identity-based encryption, the trusted third party need not be given the ability...

2013
Jian Liu

Homomorphic encryption enables computations on encrypted data. This property makes such encryption schemes useful in a wide variety of privacy preserving applications. This paper provides a brief survey on the homomorphic encryption. We describe the homomorphic cryptosystems from partially homomorphic encryption to fully homomorphic encryption. We also give some security analysis and describe h...

Journal: :IACR Cryptology ePrint Archive 2008
Xu An Wang Xiaoyuan Yang Fagen Li

In 1998, Blaze, Bleumer, and Strauss proposed a kind of cryptographic primitive called proxy re-encryption[3]. In proxy re-encryption, a proxy can transform a ciphertext computed under Alice’s public key into one that can be opened under Bob’s decryption key. In 2007, Matsuo proposed the concept of four types of proxy re-encryption schemes: CBE(Certificate Based Public Key Encryption) to IBE(Id...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید