The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Public Key Cryptography (PKC) is an asymmetric security system where encryption is done publicly by disseminating public keys and decryption is done by using private keys, known only to the owner. The process of sending these keys involve encrypting a message in using various techniques like Rivest-Shamir-Adleman and Deffie Hellman. Majority of the cryptosystems use Modular Multiplication and Modular...
Embedded Systems are designed for a variety of applications that require different types of cache designs for better performance. Processors employ cache memories to reduce the average time for fetching instructions and data. The onus is on the ability of cache, in an Embedded System, to be reconfigured based on the user applications. This work discusses the design of a Reconfigurable Embedded Data...
In the context of the performance of characterized applications on embedded systems, knowledge of memory access pattern place a vital role. Real time embedded systems have memory moules which are normally a combination of data and instruction cache, DMA, scratch pad memory and custom memory. Parameters such as area, power, and performance dictate the performance of embedded applications. Design of...
Multiplicative modular inverse is a vital operation carried out in most of the public-key systems that can accelerate the entire modular exponentiation process. In this paper a new algorithm has been proposed to evaluate modular inverse that can accept any type of integer modulus input without imposing any restriction. The calculated values are stored in a look-up table and hence named LUK-mod-inverse...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.