Browse > Article
http://dx.doi.org/10.5573/ieie.2014.51.6.117

Design of the Efficient Multiplier based on Dual Basis  

Park, Chun-Myoung (Department of Computer Engineering, Korea National University of Transportation)
Publication Information
Journal of the Institute of Electronics and Information Engineers / v.51, no.6, 2014 , pp. 117-123 More about this Journal
Abstract
This paper proposes the constructing method of effective multiplier using basis transformation. Th proposed multiplier is composed of the standard-dual basis transformation circuit module to change one input into dual basis the operation module to generate from bm to bm+k by the m degree irreducible polynomial, and the polynomial multiplicative module to consist of $m^2$ AND and m(m-1) EX-OR gates. Also, the dual-standard basis transformation circuit module to change the output part to be shown as a dual basis into standard basis is composed. The operation modules to need in each operational part are defined.
Keywords
Basis; multiplier; polynomial; primitive irreducible polynomial; transformation etc;
Citations & Related Records
연도 인용수 순위
  • Reference
1 J. Adikari, A. Barsoum, M.A. Hasan, A.H. Namin, C. Negre,"Improved Area-Time Tradeoffs for Field Multiplication Using Optimal Normal Bases," IEEE Transactions on Computers, Vol.62, No.1, pp.193-199, Jan. 2013.   DOI   ScienceOn
2 E.D. Mastrovito, "VLSI Design for Multiplication over Finite Fields," LNCS-357, Proc. AAECC-6, pp. 297-309, Rome, July 2012.
3 J. L. Imana,"Low Latency Polynomial Basis Multiplier,' IEEE Transaction on Circuit and Systems, Vol.58 No.5, pp935-946, May 2011.   DOI   ScienceOn
4 A. Menezes, I. Blake, S. Gao, R. Mullin, S. Vanstone and T. yaghoobian, Applications of Finite Fields. Kluwer Academic Publisher, 1993.
5 C.E. Shannon, "A Mathematical Theory of Communication," Bell Syst. Thch. J., 27, pp. 379-423(part I), pp. 623-656 (part II), 2009.
6 M.T. Lee, Error Correcting Coding Theory, McGraw-Hill, New York, 2010.
7 R.W. Hamming, "Error Detecting and Error Correcting Codes," Bell Syst. Thch. J., 29, pp. 147-160, 2011.
8 J. Zhou and O. C. Au,"On the Security of Chaotic Convolutional Coder," IEEE Transaction of Circuit and Systems, Vol.58, No.3, pp.595-606, Mar. 2011.   DOI   ScienceOn
9 P. A. Scott, S. E. Tarvares and L. E. Peppard, "A Fast Multiplier for GF($2^m$)," IEEE J. Select. Areas Commum., vol. SAC-4, Jan. 2010.