• Complain

Malek Safieh - Algorithms and Architectures for Cryptography and Source Coding in Non-Volatile Flash Memories

Here you can read online Malek Safieh - Algorithms and Architectures for Cryptography and Source Coding in Non-Volatile Flash Memories full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2021, publisher: Springer Vieweg, genre: Children. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Malek Safieh Algorithms and Architectures for Cryptography and Source Coding in Non-Volatile Flash Memories
  • Book:
    Algorithms and Architectures for Cryptography and Source Coding in Non-Volatile Flash Memories
  • Author:
  • Publisher:
    Springer Vieweg
  • Genre:
  • Year:
    2021
  • Rating:
    3 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 60
    • 1
    • 2
    • 3
    • 4
    • 5

Algorithms and Architectures for Cryptography and Source Coding in Non-Volatile Flash Memories: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Algorithms and Architectures for Cryptography and Source Coding in Non-Volatile Flash Memories" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

In this work, algorithms and architectures for cryptography and source coding are developed, which are suitable for many resource-constrained embedded systems such as non-volatile flash memories. A new concept for elliptic curve cryptography is presented, which uses an arithmetic over Gaussian integers. Gaussian integers are a subset of the complex numbers with integers as real and imaginary parts. Ordinary modular arithmetic over Gaussian integers is computational expensive. To reduce the complexity, a new arithmetic based on the Montgomery reduction is presented. For the elliptic curve point multiplication, this arithmetic over Gaussian integers improves the computational efficiency, the resistance against side channel attacks, and reduces the memory requirements. Furthermore, an efficient variant of the Lempel-Ziv-Welch (LZW) algorithm for universal lossless data compression is investigated. Instead of one LZW dictionary, this algorithm applies several dictionaries to speed up the encoding process. Two dictionary partitioning techniques are introduced that improve the compression rate and reduce the memory size of this parallel dictionary LZW algorithm.

Malek Safieh: author's other books


Who wrote Algorithms and Architectures for Cryptography and Source Coding in Non-Volatile Flash Memories? Find out the surname, the name of the author of the book and a list of all author's works by series.

Algorithms and Architectures for Cryptography and Source Coding in Non-Volatile Flash Memories — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Algorithms and Architectures for Cryptography and Source Coding in Non-Volatile Flash Memories" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Contents
Landmarks
Book cover of Algorithms and Architectures for Cryptography and Source Coding - photo 1
Book cover of Algorithms and Architectures for Cryptography and Source Coding in Non-Volatile Flash Memories
Schriftenreihe der Institute fr Systemdynamik (ISD) und optische Systeme (IOS)
Editors-in-Chief
Jrgen Freudenberger
Institut fr Systemdynamik, Hochschule Konstanz (HTWG), Konstanz, Baden-Wrttemberg, Deutschland
Johannes Reuter
Institut fr Systemdynamik, Hochschule Konstanz (HTWG), Konstanz, Baden-Wrttemberg, Deutschland
Matthias Franz
Institut fr Optische Systeme, Hochschule Konstanz (HTWG), Konstanz, Baden-Wrttemberg, Deutschland
Georg Umlauf
Institut fr Optische Systeme, Hochschule Konstanz (HTWG), Konstanz, Baden-Wrttemberg, Deutschland

Die Schriftenreihe der Institute fr Systemdynamik (ISD) und optische Systeme (IOS) deckt ein breites Themenspektrum ab: von angewandter Informatik bis zu Ingenieurswissenschaften. Die Institute fr Systemdynamik und optische Systeme bilden gemeinsam einen Forschungsschwerpunkt der Hochschule Konstanz. Die Forschungsprogramme der beiden Institute umfassen informations- und regelungstechnische Fragestellungen sowie kognitive und bildgebende Systeme. Das Bindeglied ist dabei der Systemgedanke mit systemtechnischer Herangehensweise und damit verbunden die Suche nach Methoden zur Lsung interdisziplinrer, komplexer Probleme. In der Schriftenreihe werden Forschungsergebnisse in Form von Dissertationen verffentlicht.

The Series of the institutes of System Dynamics (ISD) and Optical Systems (IOS) covers a broad range of topics: from applied computer science to engineering. The institutes of System Dynamics and Optical Systems form a research focus of the HTWG Konstanz. The research programs of both institutes cover problems in information technology and control engineering as well as cognitive and imaging systems. The connective link is the system concept and the systems engineering approach, i.e. the search for methods and solutions of interdisciplinary, complex problems. The series publishes research results in the form of dissertations.

Weitere Bnde in der Reihe http://www.springer.com/series/16265

Malek Safieh
Algorithms and Architectures for Cryptography and Source Coding in Non-Volatile Flash Memories
1st ed. 2021
Logo of the publisher Malek Safieh University of Ulm Munich Germany - photo 2
Logo of the publisher
Malek Safieh
University of Ulm, Munich, Germany

Dissertation, Ulm University, 2021

ISSN 2661-8087 e-ISSN 2661-8095
Schriftenreihe der Institute fr Systemdynamik (ISD) und optische Systeme (IOS)
ISBN 978-3-658-34458-0 e-ISBN 978-3-658-34459-7
https://doi.org/10.1007/978-3-658-34459-7
The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Fachmedien Wiesbaden GmbH, part of Springer Nature 2021
This work is subject to copyright. All rights are solely and exclusively licensed by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Responsible Editor: Stefanie Eggert

This Springer Vieweg imprint is published by the registered company Springer Fachmedien Wiesbaden GmbH part of Springer Nature.

The registered company address is: Abraham-Lincoln-Str. 46, 65189 Wiesbaden, Germany

Acknowledgements

First and foremost, I would like to thank my doctoral supervisor Prof. Dr. Jrgen Freudenberger for giving me the opportunity to join the research group at the Institute of System Dynamics (ISD) at the University of Applied Sciences (HTWG) Konstanz, Germany. Due to his efforts, it became possible for me to work on my Ph.D. for the last three and a half years. I appreciate the valuableness, the time, and efforts he offered for the long and fruitful discussions we had. I am very grateful for his advices and supports that contributed to the improvement of my research skills.

I would also like to thank Prof. Dr. Martin Bossert for reading my thesis and being my second supervisor. I am very thankful to all the research members at the ISD. It would be truly unfair to mention only a few people since everyone made my time there a pleasure. The conversations during the coffee breaks in the kitchen, after eating in the canteen, as well as during the after-work beer were always fun, kept me motivated and with a fresh mindset.

I would like to express my gratitude to my family and friends for all their help and contribution during my study and the research period. Further thanks goes to everyone who supported me during my doctoral research.

Abstract

Flash memory is an important non-volatile storage medium. Reliable and secure data storage in flash memories requires sophisticated coding and signal processing techniques. Although error-correcting codes are applied in practically all flash storage systems, coding techniques for cryptography and data compression are less developed.

Due to the limited computational performance of the flash controller, many flash storage systems rely on symmetric cryptography for the message authentication. Asymmetric cryptography like elliptic curve cryptographic (ECC) systems offer additional functionality such as digital signatures and key exchange methods, which allows a verification of the integrity and authenticity. In this work, we demonstrate that ECC systems over Gaussian integers are very efficient. Gaussian integers are a subset of complex numbers with integers as real and imaginary parts. Since many Gaussian integer fields are isomorphic to prime fields, this arithmetic is suitable for ECC systems. Implementations of cryptographic algorithms are prone to side channel attacks. We show that using Gaussian integers can reduce the complexity and memory requirements for hardware implementations which are protected against such attacks.

However, determining the modulo reduction over Gaussian integers is extremely expensive. To reduce the complexity, we derive a Montgomery modular arithmetic over Gaussian integers. Moreover, we develop a hardware architecture optimized for the ECC operations targeting low area. The proposed ECC processor for Gaussian integers is a competitive solution for applications in flash memories and other resource-constrained embedded systems.

Data compression provides several advantages for flash memory controllers, e.g. improving the lifetime and storage capacity. In this work, we focus on the dictionary-based Lempel-Ziv-Welch (LZW) algorithm. A fast and compact implementation of this universal data compression procedure is a challenging task due to the recursive structure of the LZW dictionary. To speed up the encoding, we present an architecture that applies multiple dictionaries in parallel. Two dictionary partitioning techniques are introduced that improve the compression rate and reduce the memory size of this parallel dictionary LZW algorithm.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Algorithms and Architectures for Cryptography and Source Coding in Non-Volatile Flash Memories»

Look at similar books to Algorithms and Architectures for Cryptography and Source Coding in Non-Volatile Flash Memories. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Algorithms and Architectures for Cryptography and Source Coding in Non-Volatile Flash Memories»

Discussion, reviews of the book Algorithms and Architectures for Cryptography and Source Coding in Non-Volatile Flash Memories and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.