Learn More
This paper proposes a set of new techniques to improve the implementation of the SHA-2 hashing algorithm. These techniques consist mostly in operation rescheduling and hardware reutilization, allowing a significant reduction of the critical path while the required area also decreases. Both SHA256 and SHA512 hash functions have been implemented and tested in(More)
Residue number systems (RNS) are non-weighted systems that allow to perform addition, subtraction and multiplication operations concurrently and independently on each residue. The triple moduli set f2 n 2 1, 2 n , 2 n þ 1g and its respective extensions have gained unprecedent importance in RNS, mainly because of the simplicity of the arithmetic units for(More)
We describe the design and implementation of SenToy: a tangible doll with sensors that allows a user to influence the emotions of a synthetic character in a game. SenToy is an input device that allows the user to perform gestures or movements that the sensors inside the doll pick up. The gestures are interpreted according to a scheme found through two(More)
This paper proposes the rescheduling of the SHA-1 hash function operations on hardware implementations. The proposal is mapped on the Xilinx Virtex II Pro technology. The proposed rescheduling allows for a manipulation of the critical path in the SHA-1 function computation , facilitating the implementation of a more parallelized structure without an(More)
— This paper presents the implementation of a dynamic FPGA partial reconfiguration system, with on-the-fly writing region delimitation. Considering that in the re-configuration bitstreams can become corrupt or can be obtained from a non secure source, delimiting the region where they can be uploaded becomes necessary. This novel concept of run-time region(More)
—In this paper, we propose two memoryless converters for the moduli set {2 2n+1 − 1, 2 2n , 2 n − 1}. First, we propose a novel reverse converter, which is purely adder based, using the traditional Chinese Remainder Theorem (CRT). Second, due to the fact that the proposed CRT based structure does not cover the entire dynamic range, a second converter, which(More)
OBJECTIVE To evaluate late respiratory effects from occupational inhalation of talc contaminated with asbestos. METHODS This was a case series study on 29 former talc mining workers with asbestos contamination, in the municipality of Carandaí, Southeastern Brazil, who were attended at the State Workers' Health Reference Center in 2004 and 2005. Their(More)
We consider the AES encryption/decryption algorithm and propose a memory based hardware design to support it. The proposed implementation is mapped on the Xilinx Virtex II Pro technology. Both the byte substitution and the polynomial multiplication of the AES algorithm are implemented in a single dual port on-chip memory block (BRAM). Two AES(More)