address generation
Recently Published Documents


TOTAL DOCUMENTS

92
(FIVE YEARS 2)

H-INDEX

10
(FIVE YEARS 0)

Author(s):  
K. Veerasamy ◽  
DK. Aarthy ◽  
T. Logeswaran ◽  
V.M. Jothiprakash


Author(s):  
Dr. Bhoj Raj Ghimire ◽  
Bijay Maharjan ◽  
Shakti Shrestha ◽  
Sanil Nakarmi
Keyword(s):  


Electronics ◽  
2020 ◽  
Vol 9 (12) ◽  
pp. 2069
Author(s):  
Byeong Yong Kong

This paper presents a low-complexity address generation unit (AGU) for multiuser detectors in interleave division multiple access (IDMA) systems. To this end, for the first time, all possible options for designing AGUs are first analyzed in detail. Subsequently, a complexity reduction technique is applied to each of those architectures. More specifically, some components in AGUs are relocated to make them shareable and removable without affecting the functionality. The complete transparency of such renovation makes it applicable to any existing multiuser detector without tailoring the interfacing components therein. Measuring the hardware complexity, all the resulting AGUs are compared with each other, and a new architecture simpler than the state-of-the-art one is developed. Implementation results in a 65 nm CMOS process, demonstrating that the proposed AGU can alleviate the equivalent gate count and the power consumption of the prior process by 13% and 31%, respectively.



Mathematics ◽  
2020 ◽  
Vol 8 (10) ◽  
pp. 1645
Author(s):  
Massimiliano Sala ◽  
Domenica Sogiorno ◽  
Daniele Taufer

We show how a small subgroup confinement-like attack may be mounted on the Bitcoin addresses generation protocol, by inspecting a special subgroup of the group associated to point multiplication. This approach does not undermine the system security but highlights the importance of using fair random sources during the private key selection.



2020 ◽  
Vol 16 (5) ◽  
pp. 155014772091874
Author(s):  
Jinglei Tan ◽  
Cheng Lei ◽  
Hongqi Zhang ◽  
Hao Hu ◽  
Hengwei Zhang

Aimed at the problem of the boundary defense easily being out of availability caused by the static network structure, a novel dynamic enterprise network defense system based on holographic transformation is designed and implemented. To increase the uncertainty of network structure and the position of target nodes, the network view is dynamically changed by constantly transforming endpoint information. Virtual endpoint mutation and hopping period selection are achieved by the hopping address generation module. It takes the advantages of anti-collision and good randomicity of the Chinese national SM3 hash algorithm. The full-cycle hopping period is managed and controlled by the hopping period management mechanism based on the ciphertext policy attribute-based broadcast holographic transformation. Experiments show that the system achieves expected security goals and has good interactivity and high stability.



2019 ◽  
Vol 13 (10) ◽  
pp. 1390-1396 ◽  
Author(s):  
Song Guangjia ◽  
Wang Hui ◽  
Wang Hangjun


2018 ◽  
Vol 53 (6) ◽  
pp. 65-75
Author(s):  
Michael Stokes ◽  
Ryan Baird ◽  
Zhaoxiang Jin ◽  
David Whalley ◽  
Soner Onder


Sign in / Sign up

Export Citation Format

Share Document