Galois Field Instructions in the Sandblaster 2.0 Architectrue

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Screaming fast Galois field arithmetic using intel SIMD instructions

Galois Field arithmetic forms the basis of Reed-Solomon and other erasure coding techniques to protect storage systems from failures. Most implementations of Galois Field arithmetic rely on multiplication tables or discrete logarithms to perform this operation. However, the advent of 128-bit instructions, such as Intel’s Streaming SIMD Extensions, allows us to perform Galois Field arithmetic mu...

متن کامل

Design and Implementation of MOSFET Circuits and CNTFET, Ternary Multiplier in the Field of Galois

Due to the high density and the low consumption power in the digital integrated circuits, mostly technology of CMOS is used. During the past times, the Metal oxide silicon field effect transistors (MOSFET) had been used for the design and implementation of the digital integrated circuits because they are compact and also they have the less consumption power and delay to the other transistors. B...

متن کامل

Design and Implementation of MOSFET Circuits and CNTFET, Ternary Multiplier in the Field of Galois

Due to the high density and the low consumption power in the digital integrated circuits, mostly technology of CMOS is used. During the past times, the Metal oxide silicon field effect transistors (MOSFET) had been used for the design and implementation of the digital integrated circuits because they are compact and also they have the less consumption power and delay to the other transistors. B...

متن کامل

Galois Field Commitment Scheme

In [3] the authors give the first mathematical formalization of an unconditionally secure commitment scheme. Their construction has some similarities to one used to build authentication codes, so they raise the question whether there is some relation between commitment schemes and authentication schemes. They conjecture that authentication schemes with arbitration can be used, but they stress t...

متن کامل

Polynomials over Galois Field

( ) [ ] [ ] ( ) 1 2 0 0 1 0 0 1 2 0 1 1 0 2 n m n m a b a b a b x a b a b a b x a b x + = ⋅ + ⋅ + ⋅ + ⋅ + ⋅ + ⋅ + + ⋅ . The coefficient operations are performed using the operations for the field from which the coefficients were taken. • Such a collection of polynomials forms a commutative ring with identity. • Nonzero field elements are considered to be zero-degree polynomials. The zero elemen...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Digital Multimedia Broadcasting

سال: 2009

ISSN: 1687-7578,1687-7586

DOI: 10.1155/2009/129698