• Title/Summary/Keyword: efficient computation

Search Result 1,281, Processing Time 0.048 seconds

An Efficient Block Cipher Implementation on Many-Core Graphics Processing Units

  • Lee, Sang-Pil;Kim, Deok-Ho;Yi, Jae-Young;Ro, Won-Woo
    • Journal of Information Processing Systems
    • /
    • v.8 no.1
    • /
    • pp.159-174
    • /
    • 2012
  • This paper presents a study on a high-performance design for a block cipher algorithm implemented on modern many-core graphics processing units (GPUs). The recent emergence of VLSI technology makes it feasible to fabricate multiple processing cores on a single chip and enables general-purpose computation on a GPU (GPGPU). The GPU strategy offers significant performance improvements for all-purpose computation and can be used to support a broad variety of applications, including cryptography. We have proposed an efficient implementation of the encryption/decryption operations of a block cipher algorithm, SEED, on off-the-shelf NVIDIA many-core graphics processors. In a thorough experiment, we achieved high performance that is capable of supporting a high network speed of up to 9.5 Gbps on an NVIDIA GTX285 system (which has 240 processing cores). Our implementation provides up to 4.75 times higher performance in terms of encoding and decoding throughput as compared to the Intel 8-core system.

A Prony Method Based on Discrete Fourier Transform for Estimation- of Oscillation Mode in Power Systems (이산푸리에변환에 기초한 Prony 법과 전력계통의 진동모드 추정)

  • Nam Hae-Kon;Shim Kwan-Shik
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.54 no.6
    • /
    • pp.293-305
    • /
    • 2005
  • This paper describes an improved Prony method in its speed, accuracy and reliability by efficiently determining the optimal sampling interval with use of DFT (discrete Fourier transformation). In the Prony method the computation time is dominated by the size of the linear prediction matrix, which is given by the number of data times the modeling order The size of the matrix in a general Prony method becomes large because of large number of data and so does the computation time. It is found that the Prony method produces satisfactory results when SNR is greater than three. The maximum sampling interval resulting minimum computation time is determined using the fact that the spectrum in DFT is inversely proportional to sampling interval. Also the process of computing the modes is made efficient by applying Hessenberg method to the companion matrix with complex shift and computing selectively only the dominant modes of interest. The proposed method is tested against the 2003 KEPCO system and found to be efficient and reliable. The proposed method may play a key role in monitoring in real time low frequency oscillations of power systems .

Efficient Computation of Eta Pairing over Binary Field with Vandermonde Matrix

  • Shirase, Masaaki;Takagi, Tsuyoshi;Choi, Doo-Ho;Han, Dong-Guk;Kim, Ho-Won
    • ETRI Journal
    • /
    • v.31 no.2
    • /
    • pp.129-139
    • /
    • 2009
  • This paper provides an efficient algorithm for computing the ${\eta}_T$ pairing on supersingular elliptic curves over fields of characteristic two. In the proposed algorithm, we deploy a modified multiplication in $F_{2^{4n}}$ using the Vandermonde matrix. For F, G ${\in}$ $F_{2^{4n}}$ the proposed multiplication method computes ${\beta}{\cdot}F{\cdot}G$ instead of $F{\cdot}G$ with some ${\beta}$ ${\in}$ $F^*_{2n}$ because ${\beta}$ is eliminated by the final exponentiation of the ${\eta}_T$ pairing computation. The proposed multiplication method asymptotically requires only 7 multiplications in $F_{2^n}$ as n ${\rightarrow}$ ${\infty}$, while the cost of the previously fastest Karatsuba method is 9 multiplications in $F_{2^n}$. Consequently, the cost of the ${\eta}_T$ pairing computation is reduced by 14.3%.

  • PDF

Efficient Fault Injection Attack to the Miller Algorithm in the Pairing Computation using Affine Coordinate System (아핀좌표를 사용하는 페어링 연산의 Miller 알고리듬에 대한 효과적인 오류주입공격)

  • Bae, Ki-Seok;Park, Jea-Hoon;Sohn, Gyo-Yong;Ha, Jae-Cheol;Moon, Sang-Jae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.3
    • /
    • pp.11-25
    • /
    • 2011
  • The Miller algorithm is employed in the typical pairing computation such as Weil, Tate and Ate for implementing ID based cryptosystem. By analyzing the Mrabet's attack that is one of fault attacks against the Miller algorithm, this paper presents au efficient fault attack in Affine coordinate system, it is the most basic coordinates for construction of elliptic curve. The proposed attack is the effective model of a count check fault attack, it is verified to work well by practical fault injection experiments and can omit the probabilistic analysis that is required in the previous counter fault model.

Computation and Smoothing Parameter Selection In Penalized Likelihood Regression

  • Kim Young-Ju
    • Communications for Statistical Applications and Methods
    • /
    • v.12 no.3
    • /
    • pp.743-758
    • /
    • 2005
  • This paper consider penalized likelihood regression with data from exponential family. The fast computation method applied to Gaussian data(Kim and Gu, 2004) is extended to non Gaussian data through asymptotically efficient low dimensional approximations and corresponding algorithm is proposed. Also smoothing parameter selection is explored for various exponential families, which extends the existing cross validation method of Xiang and Wahba evaluated only with Bernoulli data.

Development of naphtha reforming process simulator (나프타 개질 공정 전문 모사기의 개발)

  • 최영호;권영운;윤인섭
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1991.10a
    • /
    • pp.87-92
    • /
    • 1991
  • A naphtha reforming process treats the feed naphtha for the production of BTX and high octane gasoline. In this paper, the development of NAFOS (Naphtha Reformer Steady-State Simulator), which is the efficient tool for the wide range of reforming process studies, is presented. NAFOS system is based on the sequential modular approach and composed of unit computation routines, physical properties data base, numerical routines, flowsheet convergence routine and user interfaces for input-output control. The developed NAFOS system has been tested by computation of the UOP Platforrming process. Simulation results of NAFOS corresponded with that of established general purpose simulator (ASPEN PLUS), and faster for the same simulation case.

  • PDF

Penalized Likelihood Regression: Fast Computation and Direct Cross-Validation

  • Kim, Young-Ju;Gu, Chong
    • Proceedings of the Korean Statistical Society Conference
    • /
    • 2005.05a
    • /
    • pp.215-219
    • /
    • 2005
  • We consider penalized likelihood regression with exponential family responses. Parallel to recent development in Gaussian regression, the fast computation through asymptotically efficient low-dimensional approximations is explored, yielding algorithm that scales much better than the O($n^3$) algorithm for the exact solution. Also customizations of the direct cross-validation strategy for smoothing parameter selection in various distribution families are explored and evaluated.

  • PDF

The Development of Algorithm Method for 0-1 Knapsack Problem (0 - 1 배낭문제의 Algorithm 개발에 관한 연구)

  • 신현재
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.7 no.10
    • /
    • pp.29-33
    • /
    • 1984
  • Many methods have been developed to get a good Computation steps. I think that almost methods of them have been solved by using a theory of [Vj]. But I have thought that it Can be solved by an other method. This method is a way to get a Computations steps by using [Aj] instead of [Vj]. It requires less Computation time than [Vj]. So I think that method is an efficient Algorithm about "the Development of Algorithm method for the 0 - 1 Knapsack problem."

  • PDF

Efficient Computation of Fixed and Mixed Polarity Reed-Muller Function Vector over GF(p)

  • Kim Young Gun;Kim Jong O;Kim Heung Soo
    • Proceedings of the IEEK Conference
    • /
    • 2004.08c
    • /
    • pp.503-508
    • /
    • 2004
  • This paper proposes an efficient computation method for fixed and mixed polarity Reed -Muller function vector over Galois field GF(p). Function vectors of fixed polarity Heed Muller function with single variable can be generated by proposed method. The n-variable function vectors can be calculated by means of the Kronecker product of a single variable function vector corresponding to each variable. Thus, all fixed and mixed polarity Reed-Muller function vectors are calculated directly without using a polarity function vector table or polarity coefficient matrix.

  • PDF

An Efficient Brownian Motion Simulation Method for the Conductivity of a Digitized Composite Medium

  • Kim, In-Chan
    • Journal of Mechanical Science and Technology
    • /
    • v.17 no.4
    • /
    • pp.545-561
    • /
    • 2003
  • We use the first-passage-time formulation by Torquato, Kim and Cule [J. Appl. Phys., Vol. 85, pp. 1560∼1571 (1999) ], which makes use of the first-passage region in association with the diffusion tracer's Brownian movement, and develop a new efficient Brownian motion simulation method to compute the effective conductivity of digitized composite media. By using the new method, one can remarkably enhance the speed of the Brownian walkers sampling the medium and thus reduce the computation time. In the new method, we specifically choose the first-passage regions such that they coincide with two, four, or eight digitizing units according to the dimensionality of the composite medium and the local configurations around the Brownian walkers. We first obtain explicit solutions for the relevant first-passage-time equations in two-and three-dimensions. We then apply the new method to solve the illustrative benchmark problem of estimating the effective conductivities of the checkerboard-shaped composite media. for both periodic and random configurations. Simulation results show that the new method can reduce the computation time about by an order of magnitude.