Qihui Zhang

  • Citations Per Year
Learn More
It is important to develop a high-performance FFT processor to meet the requirements of real time and low cost in many different systems. So a radix-2 pipelined FFT processor based on Field Programmable Gate Array (FPGA) for Wireless Local Area Networks (WLAN) is proposed. Unlike being stored in the traditional ROM, the twiddle factors in our pipelined FFT(More)
In this paper, a memory-based architecture of FFT processor customized for OFDM-based communication systems is presented. For the finite word length effects consideration of the Decimation In Time (DIT) and Decimation In Frequency (DIF) algorithms, DIF algorithm is selected in our design. Complex multiplication is the main design key in the FFT butterfly(More)
Three-party password-authenticated key exchange (3PAKE) allows two clients, each sharing a password with a trusted server, to establish a session key with the help of the server. It is a quite practical mechanism for establishing secure channels in a large communication network. However, most current 3PAKE protocols are analyzed in security models that do(More)
PURPOSE Final global disability 3 months post-stroke is the cardinal endpoint in acute stroke clinical trials. The most similar variable available in administrative datasets is discharge destination at end of the acute hospitalization. We investigated the predictive value of discharge destination for final global disability. METHODS In the public dataset(More)
Background and purpose: This study was undertaken to investigate the development changes of myristoylated alanine-rich C kinase substrate (MARCKS) phosphorylation expression in acute ischemia hippocampus and cortex, to establish the relationship between these changes and ischemia damage. Methods: The acute multi-cerebral infarction model was established by(More)
In this paper, we present a new authenticated key exchange (AKE) protocol, called NS+, which allows the adversary to reveal all the ephemeral secret information, especially including the Diffie-Hellman exponets, used for building one party's outputting message. We also prove the security of this protocol in the eCK model, under the random oracle assumption(More)
With the rapid development of VLSI technique and the continuous improvement of application requirement, problems such as power consumption and clock skew of integrated circuit have become more and more serious. Because of having several advantages such as low power, high performance and elimination of global clock, asynchronous circuit and its design(More)
  • 1