Akira MOCHIZUKI Hirokatsu SHIRAHAMA Takahiro HANYU
This paper presents a high-speed 5454-bit multiplier using fully differential-pair circuits (DPCs) in 0.18 µm CMOS. The DPC is a key component in maintaining an input signal-voltage swing of 0.2 V while providing a large current-driving capability. The combination of the DPC and the multiple-valued current-mode linear summation makes the critical path shortened and transistor counts reduced. The multiplier has an estimated multiply time of 1.88 ns with 74.2 mW at 400 MHz from a 1.8 V supply occupying a 0.85 mm2 active area.
Masao MORIMOTO Makoto NAGATA Kazuo TAKI
Asymmetric Slope Dual Mode Differential Logic (ASDMDL) embodies high-speed dynamic and low-power static operations in a single design. Two-phase dual-rail logic signaling is used in a high-speed operation, where a logical evaluation is preceded by pre-charge, and it asserts one of the rails with an asymmetrically shortened rise transition to express a binary result. On the other hand, single-phase differential logic signaling eliminates pre-charge and leads to a low-power static operation. The operation mode is defined by the logic signaling styles, and no control signal is needed in the logic cell. The design of mixed CMOS and ASDMDL logic circuits can be automated with general logic synthesis and place-and-route techniques, since the physical ASDMDL cell is prepared in such a way to comply with a CMOS standard-cell design flow. A mixed ASDMDL/CMOS micro-processor in a 0.18-µm CMOS technology demonstrated 232 MHz operation, corresponding to 14% speed improvement over a full CMOS implementation. This was achieved by substituting ASDMDL cells for only 4% of the CMOS logic cells in data paths. The low-speed operation of ASDMDL at 100 MHz was nearly equivalent to that of CMOS. However, power consumption was reduced by 3% due to the use of ASDMDL complex logic cells. Area overhead was less than 4%.
Feroza BEGUM Yoshinori NAMIHIRA S.M. Abdur RAZZAK Nianyu ZOU
This study proposes a novel structure of index-guiding square photonic crystal fibers (SPCF) having simultaneously ultra-flattened chromatic dispersion characteristics and low confinement losses in a wide wavelength range. The finite difference method (FDM) with anisotropic perfectly matched layers (PMLs) is used to analyze the various properties of square PCF. The findings reveal that it is possible to design five-ring PCFs with a flattened negative chromatic dispersion of 0-1.5 ps/(nm.km) in a wavelength range of 1.27 µm to 1.7 µm and a flattened chromatic dispersion of 01.15 ps/(nm.km) in a wavelength range of 1.25 µm to 1.61 µm. Simultaneously it also exhibited that the confinement losses are less than 10-9 dB/m and 10-10 dB/m in the wavelength range of 1.25 µm to 1.7 µm.
Junichi NAKAYAMA Kazuhiro HATTORI Yasuhiko TAMURA
This paper deals with the singular behavior of the diffraction of transverse magnetic (TM) waves by a perfectly conductive triangular periodic surface at a low grazing limit of incidence. The wave field above the highest excursion of the surface is represented as a sum of Floquet modes with modified diffraction amplitudes, whereas the wave field inside a triangular groove is written as a sum of guided modes with unknown mode amplitudes. Then, two sets of equations are derived for such amplitudes. From the equation sets, all the amplitudes are analytically shown to vanish at a low grazing limit of incidence. From this fact, it is concluded analytically that no diffraction takes place and only reflection occurs at a low grazing limit of incidence for any period length and any triangle height. This theoretical result is verified by a numerical example.
Keiji GOTO Toshihide AJIKI Toru KAWANO Toyohiko ISHIHARA
When a cylindrically curved concave conducting surface is terminated abruptly at the edge, the whispering gallery (WG) mode propagating toward the edge direction is radiated into the free space from the aperture plane at the edge. In this paper, by applying the new analysis method, we shall derive a uniform geometrical theory of diffraction solution (UTD) for the electric-type WG mode radiation field applicable in the transition region near the geometrical boundaries produced by the incident modal ray on the edge of the curved surface. The UTD is represented by the summation of the solution for the geometrical ray converted from the modal ray of the WG mode and the solution for the uniform edge diffracted ray scattered at the cylindrically curved edge. By comparing with the reference solution obtained numerically from the integral representation of the radiation field, we will confirm the validity and the utility of the UTD proposed in this paper.
Ruey-Ching TWU Chia-Chih HUANG Way-Seen WANG
A ridge-type Zn-indiffused Mach-Zehnder modulator operating at 1.55 µm wavelength is demonstrated on a z-cut LiNbO3 substrate for the first time. The measured results show that the values of voltage-length product can be reduced from 9.6 V-cm to 8.1 V-cm with the etched depth of 1.7 µm.
Lightwave switching is discussed with a cascaded connection of optical couplers with light intensity control elements. By employing wavelength-selective amplifiers such as a waveguide-type Raman amplifier, all-optical wavelength-selective switching can be realized. We discuss analytically using coupled-mode theory that the lightwave switching is feasible by controlling the intensity of propagating lightwave. The switching operation is verified numerically using finite-difference beam-propagation method. As a result, the expected operation is realized and some characteristics involved with dependencies of wavelength and phase are also investigated. A preliminary experiment using attenuators, beam splitters and mirrors is also described to verify the switching operation with only light-intensity control in interferometers.
Kai CAI Rongquan FENG Zhiming ZHENG
Sequences with good correlation properties are widely used in engineering applications, especially in the area of communications. Among the known sequences, cyclotomic families have the optimal autocorrelation property. In this paper, we decide the cross-correlation function of the known cyclotomic sequences completely. Moreover, to get our results, the relations between the multiplier group and the decimations of the characteristic sequence are also established for an arbitrary difference set.
We have proposed a diffusion-type flow control mechanism to achieve the extremely time-sensitive flow control required for high-speed networks. In this mechanism, each node in a network manages its local traffic flow only on the basis of the local information directly available to it, by using predetermined rules. In this way, the implementation of decision-making at each node can lead to optimal performance for the whole network. Our previous studies concentrated on the flow control for a single flow. In this paper, we propose a diffusion-type flow control mechanism for multiple flows. The proposed scheme enables a network to quickly recover from a state of congestion and to achieve fairness among flows.
We determine the annealing dynamics of AsGa antisite defects in As ion-implanted GaAs. An Arrhenius plot of the carrier decay rate or the defect density vs. the annealing temperature in the high temperature regime gives an energy EPA, which is different from true activation energy. The annealing time dependence of EPA obtained by the two diffusion models (self diffusion of AsGa antisite defects and VGa vacancy assisted diffusion of AsGa antisite defects) are compared with EPA's obtained from already published works. The results prove that the diffusion of AsGa antisite defects is assisted by the VGa vacancy defects that exist in a high density.
Jong Suk LEE Jae Woon LEE Young Hwan KIM
Differential power analysis (DPA) is an effective technique that extracts secret keys from cryptographic systems through statistical analysis of the power traces obtained during encryption and decryption operations. This letter proposes symmetric discharge logic (SDL), a circuit-level countermeasure against DPA, which exhibits uniform power traces for every clock period by maintaining a set of discharge paths independent of input values. This feature minimizes differences in power traces and improves resistance to DPA attacks. HSPICE simulations for the test circuits using 0.18 µm TSMC CMOS process parameters indicate that SDL reduces power differences by an order of magnitude, compared to the existing circuit-level technique.
Minoru SAEKI Daisuke SUZUKI Tetsuya ICHIKAWA
In this paper, we propose new models for directly evaluating DPA leakage from logic information in CMOS circuits. These models are based on the transition probability for each gate, and are naturally applicable to various actual devices for simulating power analysis. Furthermore, we demonstrate the weakness of previously known hardware countermeasures for both our model and FPGA and suggest secure conditions for the hardware countermeasure.
Poonlap LAMSRICHAN Teerapat SANGUANKOTCHAKORN
It is well-known that one of the best wavelet-based image compression techniques, called Wavelet Difference Reduction-WDR, has both simple algorithm and comparative rate-distortion results comparing to other coders in the literature. In this paper, we propose an algorithm to enhance the performance of WDR coder in a very efficient way. The methodology is highly based on the context adaptive model. High-order statistical context modeling is used for significant coefficients prediction by scanning order adaptation of WDR. In binary mode, the coder is clearly better than Set Partitioning in Hierarchical Trees (SPIHT). A new conditional Arithmetic Coding (AC) using array of contexts is specifically designed for WDR-based coder. Based on our simulation results of all images in the test set which covers various types of images, it is apparent that our proposed coder in AC mode generates the rate-distortion results that are superior to those of all other WDR-based coders in the literature. Furthermore, it is very competitive to SPIHT-AC and JPEG2000, the best coders, at all bit rates.
Daisuke SUZUKI Minoru SAEKI Tetsuya ICHIKAWA
This paper proposes a new countermeasure, Random Switching Logic (RSL), against DPA (Differential Power Analysis) and Second-Order DPA at the logic level. RSL makes a signal transition uniform at each gate and suppresses the propagation of glitch to allow power consumption to be independent of predictable data. Furthermore, we implement basic logic circuits on the FPGA (Field Programmable Gate Array) by using RSL, and evaluate the effectiveness. As a result, we confirm the fact that the secure circuit can be structured against DPA and Second-Order DPA.
Haruki OTA Kazuki YONEYAMA Shinsaku KIYOMOTO Toshiaki TANAKA Kazuo OHTA
Password-based authenticated key exchange protocols are more convenient and practical, since users employ human-memorable passwords that are simpler to remember than cryptographic secret keys or public/private keys. Abdalla, Fouque, and Pointcheval proposed the password-based authenticated key exchange protocol in a 3-party model (GPAKE) in which clients trying to establish a secret do not share a password between themselves but only with a trusted server. On the other hand, Canetti presented a general framework, which is called universally composable (UC) framework, for representing cryptographic protocols and analyzing their security. In this framework, the security of protocols is maintained under a general protocol composition operation called universal composition. Canetti also proved a UC composition theorem, which states that the definition of UC-security achieves the goal of concurrent general composition. A server must manage all the passwords of clients when the 3-party password-based authenticated key exchange protocols are realized in large-scale networks. In order to resolve this problem, we propose a hierarchical hybrid authenticated key exchange protocol (H2AKE). In H2AKE, forwarding servers are located between each client and a distribution server, and the distribution server sends the client an authentication key via the forwarding servers. In H2AKE, public/private keys are used between servers, while passwords are also used between clients and forwarding servers. Thus, in H2AKE, the load on the distribution server can be distributed to the forwarding servers concerning password management. In this paper, we define hierarchical hybrid authenticated key exchange functionality. H2AKE is the universal form of the hierarchical (hybrid) authenticated key exchange protocol, which includes a 3-party model, and it has the characteristic that the construction of the protocol can flexibly change according to the situation. We also prove that H2AKE is secure in the UC framework with the security-preserving composition property.
Boo Hwan LEE Il CHOI Gi Joon JEON
This paper presents a motion-based boundary tracking method for a moving deformable object in an image sequence using a parametric active contour model. Deciding the local converging directions of the contour points is essential for correctly extracting the boundary of a moving deformable object. Thus, a new energy function for a parametric active contour model is proposed based on the addition of a directional energy term using a frame difference map to the greedy snake. The frame difference map is used to obtain motion information on an object with fast and non-rigid motion. Plus, updating rules for the frame difference map are also developed to encourage the stable convergence of the contour points. Experiments on a set of synthetic and real image sequences show that the proposed method could fully track a speedy deformable object while exactly extracting the boundary of the object in every frame.
Nobuyuki SUGIO Hiroshi AONO Sadayuki HONGO Toshinobu KANEKO
This paper proposes novel calculuses of linearizing attack that can be applied to higher order differential attack. Higher order differential attack is a powerful and versatile attack on block ciphers. It can be roughly summarized as follows: (1) Derive an attack equation to estimate the key by using the higher order differential properties of the target cipher, (2) Determine the key by solving an attack equation. Linearizing attack is an effective method of solving attack equations. It linearizes an attack equation and determines the key by solving a system of linearized equations using approaches such as the Gauss-Jordan method. We enhance the derivation algorithm of the coefficient matrix for linearizing attack to reduce computational cost (fast calculus 1). Furthermore, we eliminate most of the unknown variables in the linearized equations by making the coefficient column vectors 0 (fast calculus 2). We apply these algorithms to an attack of the five-round variant of KASUMI and show that the attack complexity is equivalent to 228.9 chosen plaintexts and 231.2 KASUMI encryptions.
Yasuo AZUMA Masayuki KANEHARA Toshiharu TERANISHI Yutaka MAJIMA
We demonstrate single electron counting on an alkanethiol-protected Au nanodot in a double-barrier tunneling structure by noncontact atomic-force spectroscopy (nc-AFS). The Coulomb step width dependence on the Au nanodot diameter is observed. Evaluation of fractional charge Q0 and contact potential difference by nc-AFS reveals a Vd-independent voltage shift due to Q0.
It has been shown that the maskless dye-diffusion technique is applicable to a conjugated polymer poly(9,9-dioctylfluorene). The introduction of Coumarin 6 and Nile red results in green and white emission, with the increased onset voltage for the both cases. It has also been confirmed that the heat treatment effect during the maskless dye diffusion technique results in not the increase but the decrease of the onset voltage, indicating that the dye plays a role of carrier trap in the polymer.
Sung-il JUNG Younghun KWON Sung-il YANG
In this letter, we suggest a noise estimation method which can be applied for speech enhancement in various noise environments. The proposed method consists of the following two main processes to analyze and estimate efficiently the noise from the noisy speech. First, a least-squares line is used, which is obtained by applying coefficient magnitudes in node with a uniform wavelet packet transform to a least squares method. Next, a differential forgetting factor and a correlation coefficient per subband are applied, where each subband consists of several nodes with the uniform wavelet packet transform. In particular, this approach has the ability to update noise estimation by using the estimated noise at the previous frame only instead of employing the statistical information of long past frames and explicit nonspeech frames detection consisted of noise signals. In objective assessments, we observed that the performance of the proposed method was better than that of the compared methods. Furthermore, our method showed a reliable result even at low SNR.