• Title/Summary/Keyword: GF(2$^n$)

Search Result 146, Processing Time 0.024 seconds

Fabrication of tantalum nitride thin film strain gauges and its characteristics (Ta-N 스트레인 게이지의 제작과 그 특성)

  • Lee, Tae-Won;Chung, Gwiy-Sang
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 2006.06a
    • /
    • pp.376-377
    • /
    • 2006
  • This paper presents the characteristics of Ta-N thin film strain gauges that are suitable for harsh environemts, which were deposited on thermally oxidized Si substrates by DC reactive magnetronsputtering in an argon-nitrogen atmosphere (Ar-$N_2$ (4 ~ 16 %)). These films were annealed for 1 hr in $2{\times}10^{-6}$ Torr in a vacuum furnace with temperatures that ranged from 500 - $1000^{\circ}C$. The optimized deposition and annealing conditions of the Ta-N thin film strain gauges were determined using 8 % $N_2$ gas flow ratio and annealing at $900^{\circ}C$ for 1 hr. Under optimum formation conditions, the Ta-N thin film strain gauges obtained a high electrical resistivity, ${\rho}\;=\;768.93\;{\mu}{\Omega}{\cdot}cm$, a low temperature coefficient of resistance, $TCR\;=\;-84\;ppm/^{\circ}C$ and a high temporal stability with a good longitudinal gauge factor, GF=4.12. The fabricated Ta-N thin film strain gauges are expected to be used inmicromachined pressure sensors and load cells that are operable under harsh environments.

  • PDF

Improved Modular Inversion over GF(p)

  • Choi, Jong-Hwa;Kim, Yong-Dae;Ahn, Young-Il;You, Young-Gap
    • International Journal of Contents
    • /
    • v.3 no.2
    • /
    • pp.40-43
    • /
    • 2007
  • This paper proposed a new modular inverse algorithm based on the right-shifting binary Euclidean algorithm. For an n-bit numbers, the number of operations for the proposed algorithm is reduced about 61.3% less than the classical binary extended Euclidean algorithm. The proposed algorithm implementation shows substantial reduction in computation time over Galois field GF(p).

REPRESENTATIONS OF U3,6 AND AG(2, 3)

  • Ahn, Seung-Ho;Han, Boong-Bi
    • Honam Mathematical Journal
    • /
    • v.33 no.3
    • /
    • pp.381-391
    • /
    • 2011
  • One of the main interesting things of a matroid theory is the representability by a matroid from a matrix over some field F. The representability of uniform matroid $U_{m,n}$ over some field are studied by many authors. In this paper we construct a matrix representing $U_{3,6}$ over the field GF(4). Also we find out matrix of the affine matroid AG(2, 3) over the field GF(4).

Design and Analysis of a Linear Systolic Array for Modular Exponentation in GF(2m) (GF(2m) 상에서 모듈러 지수 연산을 위한 선형 시스톨릭 어레이 설계 및 분석)

  • Lee, Won-Ho;Lee, Geon-Jik;Yu, Gi-Yeong
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.7
    • /
    • pp.743-751
    • /
    • 1999
  • 공개키 암호 시스템에서 모듈러 지수 연산은 주된 연산으로, 이 연산은 내부적으로 모듈러 곱셈을 반복적으로 수행함으로써 계산된다. 본 논문에서는 GF(2m)상에서 수행할 수 있는 Montgomery 알고리즘을 분석하여 right-to-left 방식의 모듈러 지수 연산에서 공통으로 계산 가능한 부분을 이용하여 모듈러 제곱과 모듈러 곱셈을 동시에 수행하는 선형 시스톨릭 어레이를 설계한다. 본 논문에서 설계한 시스톨릭 어레이는 기존의 곱셈기보다 모듈러 지수 연산시 약 0.67배 처리속도 향상을 가진다. 그리고, VLSI 칩과 같은 하드웨어로 구현함으로써 IC 카드에 이용될 수 있다.Abstract One of the main operations for the public key cryptographic system is the modular exponentiation, it is computed by performing the repetitive modular multiplications. In this paper, we analyze Montgomery's algorithm and design a linear systolic array to perform modular multiplication and modular squaring simultaneously. It is done by using common-multiplicand modular multiplication in the right-to-left modular exponentiation over GF(2m). The systolic array presented in this paper improves about 0.67 times than existing multipliers for performing the modular exponentiation. It could be designed on VLSI hardware and used in IC cards.

Algebraic Geometric Codes and Subfields of Hermitian Function Field (대수기하부호와 Hermitian 함수체의 부분체)

  • 양경철
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.19 no.3
    • /
    • pp.418-424
    • /
    • 1994
  • Like the Hermitian function field over GF(q), those subfields defined by y +y=x where s divides q+1 are also maximal, having the maximum number os places of degree one permissible by the Hasse-Weil bound. Geometric Goppa codes(or algebraic geometric codes) arising from these subfields of the Hermitian function field are studied in this paper. Their dimension and minimum distance are explicilty and completely presented for any m with m

  • PDF

Analysis of Code Sequence Generating Algorism and Implementation of Code Sequence Generator using Boolean Functions (부울함수를 이용한 부호계열 발생알고리즘 분석 부호계열발생기 구성)

  • Lee, Jeong-Jae
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.13 no.4
    • /
    • pp.194-200
    • /
    • 2012
  • In this paper we analyze the code sequence generating algorism defined on $GF(2^n)$ proposed by S.Bostas and V.Kumar[7] and derive the implementation functions of code sequence generator using Boolean functions which can map the vector space $F_2^n$ of all binary vectors of length n, to the finite field with two elements $F_2$. We find the code sequence generating boolean functions based on two kinds of the primitive polynomials of degree, n=5 and n=7 from trace function. We then design and implement the code sequence generators using these functions, and produce two code sequence groups. The two groups have the period 31 and 127 and the magnitudes of out of phase(${\tau}{\neq}0$) autocorrelation and crosscorrelation functions {-9, -1, 7} and {-17, -1, 15}, satisfying the period $L=2^n-1$ and the correlation functions $R_{ij}({\tau})=\{-2^{(n+1)/2}-1,-1,2^{(n+l)/2}-1\}$ respectively. Through these results, we confirm that the code sequence generators using boolean functions are designed and implemented correctly.

Experimental Design of S box and G function strong with attacks in SEED-type cipher (SEED 형식 암호에서 공격에 강한 S 박스와 G 함수의 실험적 설계)

  • 박창수;송홍복;조경연
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.1
    • /
    • pp.123-136
    • /
    • 2004
  • In this paper, complexity and regularity of polynomial multiplication over $GF({2^n})$ are defined by using Hamming weight of rows and columns of the matrix ever GF(2) which represents polynomial multiplication. It is shown experimentally that in order to construct the block cipher robust against differential cryptanalysis, polynomial multiplication of substitution layer and the permutation layer should have high complexity and high regularity. With result of the experiment, a way of constituting S box and G function is suggested in the block cipher whose structure is similar to SEED, which is KOREA standard of 128-bit block cipher. S box can be formed with a nonlinear function and an affine transform. Nonlinear function must be strong with differential attack and linear attack, and it consists of an inverse number over $GF({2^8})$ which has neither a fixed pout, whose input and output are the same except 0 and 1, nor an opposite fixed number, whose output is one`s complement of the input. Affine transform can be constituted so that the input/output correlation can be the lowest and there can be no fixed point or opposite fixed point. G function undergoes linear transform with 4 S-box outputs using the matrix of 4${\times}$4 over $GF({2^8})$. The components in the matrix of linear transformation have high complexity and high regularity. Furthermore, G function can be constituted so that MDS(Maximum Distance Separable) code can be formed, SAC(Strict Avalanche Criterion) can be met, and there can be no weak input where a fixed point an opposite fixed point, and output can be two`s complement of input. The primitive polynomials of nonlinear function affine transform and linear transformation are different each other. The S box and G function suggested in this paper can be used as a constituent of the block cipher with high security, in that they are strong with differential attack and linear attack with no weak input and they are excellent at diffusion.

Subquadratic Space Complexity Multiplier for GF($2^n$) Using Type 4 Gaussian Normal Bases

  • Park, Sun-Mi;Hong, Dowon;Seo, Changho
    • ETRI Journal
    • /
    • v.35 no.3
    • /
    • pp.523-529
    • /
    • 2013
  • Subquadratic space complexity multipliers for optimal normal bases (ONBs) have been proposed for practical applications. However, for the Gaussian normal basis (GNB) of type t > 2 as well as the normal basis (NB), there is no known subquadratic space complexity multiplier. In this paper, we propose the first subquadratic space complexity multipliers for the type 4 GNB. The idea is based on the fact that the finite field GF($2^n$) with the type 4 GNB can be embedded into fields with an ONB.

On the Construction of the 90/150 State Transition Matrix Corresponding to the Trinomial x2n-1 + x + 1 (3항 다항식 x2n-1 + x + 1에 대응하는 90/150 상태전이행렬의 구성)

  • Kim, Han-Doo;Cho, Sung-Jin;Choi, Un-Sook
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.2
    • /
    • pp.383-390
    • /
    • 2018
  • Since cellular automata(CA) is superior to LFSR in randomness, it is applied as an alternative of LFSR in various fields. However, constructing CA corresponding to a given polynomial is more difficult than LFSR. Cattell et al. and Cho et al. showed that irreducible polynomials are CA-polynomials. And Cho et al. and Sabater et al. gave a synthesis method of 90/150 CA corresponding to the power of an irreducible polynomial, which is applicable as a shrinking generator. Swan characterizes the parity of the number of irreducible factors of a trinomial over the finite field GF(2). These polynomials are of practical importance when implementing finite field extensions. In this paper, we show that the trinomial $x^{2^n-1}+X+1$ ($n{\geq}2$) are CA-polynomials. Also the trinomial $x^{2^a(2^n-1)}+x^{2^a}+1$ ($n{\geq}2$, $a{\geq}0$) are CA-polynomials.