نتایج جستجو برای: xor gate

تعداد نتایج: 44318  

2015
Korra Ravi Kumar

-This paper explains a new approach to design Exclusive-OR gate using 2 transistors. A full adder circuit has been designed by using proposed 2T Exclusive-OR circuit and a transmission gate is used extensively in very large-scale integration (VLSI) application. The power dissipation of the adder is in range of 421.7256uw to 581.542uw in 0.35 um technology with a voltage supply is in the range o...

Journal: :IET Information Security 2007
Haining Fan Jia-Guang Sun Ming Gu Kwok-Yan Lam

We describe how a simple way to split input operands allows for fast VLSI implementations of subquadratic GF (2)[x] Karatsuba-Ofman multipliers. The theoretical XOR gate delay of the resulting multipliers is reduced significantly. For example, it is reduced by about 33% and 25% for n = 2 and n = 3 (t > 1), respectively. To the best of our knowledge, this parameter has never been improved since ...

2011
Arman Roohi Hossein Khademolhosseini Samira Sayedsalehi Keivan Navi

Quantum-dot Cellular Automata (QCA) technology is attractive due to its low power consumption, fast speed and small dimension; therefore it is a promising alternative to CMOS technology. Additionally, multiplexer is a useful part in many important circuits. In this paper we propose a novel design of 2:1 MUX in QCA. Moreover, a 4:1 multiplexer, an XOR gate and a latch are proposed based on our 2...

2013
Manjunath Doddavenkatappa Mun Choon Chan Ben Leong

It is well-known that the time taken for disseminating a large data object over a wireless sensor network is dominated by the overhead of resolving the contention for the underlying wireless channel. In this paper, we propose a new dissemination protocol called Splash, that eliminates the need for contention resolution by exploiting constructive interference and channel diversity to effectively...

Journal: :CoRR 2010
John Robert Burger

New to neuroscience with implications for AI, the exclusive OR, or any other Boolean gate may be biologically accomplished within a single region where active dendrites merge. This is demonstrated below using dynamic circuit analysis. Medical knowledge aside, this observation points to the possibility of specially coated conductors to accomplish artificial dendrites.

Journal: :IACR Cryptology ePrint Archive 2015
Xiaolin Xu Ulrich Rührmair Daniel E. Holcomb Wayne P. Burleson

The Bistable Ring (BR) Physical Unclonable Function (PUF) is a newly proposed hardware security primitive in the PUF family. In this work, we comprehensively evaluate its resilience against Machine Learning (ML) modeling attacks. Based on the success of ML attacks, we propose XOR strategies to enhance the security of BR PUFs. Our results show that the XOR BR PUF with more than four parallel BR ...

2004
Ahmed Sayed Hussain Al-Asaad

In this paper, we survey various designs of low-power full-adder cells from conventional CMOS to really inventive XOR-based designs. We further describe simulation experiments that compare the surveyed full-adder cells. The experiments simulate all combinations of input transitions and consequently determine the delay and power consumption for the various full-adder cells. Moreover, the simulat...

Journal: :CoRR 2014
Saikat Majumder Shrish Verma

One of the most efficient methods of exploiting space diversity for portable wireless devices is cooperative communication utilizing space-time block codes. In cooperative communication, users besides communicating their own information, also relay the information of other users. In this paper we investigate a scheme where cooperation is achieved using two methods, namely, distributed space-tim...

Journal: :CoRR 2009
A. Arul Lawrence Selvakumar R. S. Ratastogi

In this paper we analyse the role of some of the building blocks in SHA-256. We show that the disturbance correction strategy is applicable to the SHA-256 architecture and we prove that functions Σ, σ are vital for the security of SHA-256 by showing that for a variant without them it is possible to find collisions with complexity 2 64 hash operations. As a step towards an analysis of the full f...

Journal: :IJCNIS 2010
Khadija Rasul Nujhat Nuerie Al-Sakib Khan Pathan

Key management is an important issue in Wireless Sensor Networks (WSNs) for the secure communications among the nodes in the network. Based on the network settings and structure of the network, keys could be managed in various ways. Though there are quite a good number of key management schemes for WSNs, in this work, we present an enhanced heterogeneous tree based key management scheme for sec...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید