The Experts below are selected from a list of 32457 Experts worldwide ranked by ideXlab platform
James Irvine - One of the best experts on this subject based on the ideXlab platform.
-
FPL - Using System Generator to Design a Reconfigurable Video Encryption System
Field Programmable Logic and Application, 2003Co-Authors: Daniel Denning, Neil Harold, Malachy Devlin, James IrvineAbstract:In this paper, we discuss the use of System Generator to design a reconfigurable video Encryption System. It includes the design of the AES (Advanced Encryption System) and Enigma Encryption cores. As a result of using this design flow, we are able to efficiently implement our System and algorithms with a significant improvement on traditional design times, without compromise for performance.
-
Using System Generator to design a reconfigurable video Encryption System
Lecture Notes in Computer Science, 2003Co-Authors: Daniel Denning, Neil Harold, Malachy Devlin, James IrvineAbstract:In this paper, we discuss the use of System Generator to design a reconfigurable video Encryption System. It includes the design of the AES (Advanced Encryption System) and Enigma Encryption cores. As a result of using this design flow, we are able to efficiently implement our System and algorithms with a significant improvement on traditional design times, without compromise for performance.
Daniel Denning - One of the best experts on this subject based on the ideXlab platform.
-
FPL - Using System Generator to Design a Reconfigurable Video Encryption System
Field Programmable Logic and Application, 2003Co-Authors: Daniel Denning, Neil Harold, Malachy Devlin, James IrvineAbstract:In this paper, we discuss the use of System Generator to design a reconfigurable video Encryption System. It includes the design of the AES (Advanced Encryption System) and Enigma Encryption cores. As a result of using this design flow, we are able to efficiently implement our System and algorithms with a significant improvement on traditional design times, without compromise for performance.
-
Using System Generator to design a reconfigurable video Encryption System
Lecture Notes in Computer Science, 2003Co-Authors: Daniel Denning, Neil Harold, Malachy Devlin, James IrvineAbstract:In this paper, we discuss the use of System Generator to design a reconfigurable video Encryption System. It includes the design of the AES (Advanced Encryption System) and Enigma Encryption cores. As a result of using this design flow, we are able to efficiently implement our System and algorithms with a significant improvement on traditional design times, without compromise for performance.
Malachy Devlin - One of the best experts on this subject based on the ideXlab platform.
-
FPL - Using System Generator to Design a Reconfigurable Video Encryption System
Field Programmable Logic and Application, 2003Co-Authors: Daniel Denning, Neil Harold, Malachy Devlin, James IrvineAbstract:In this paper, we discuss the use of System Generator to design a reconfigurable video Encryption System. It includes the design of the AES (Advanced Encryption System) and Enigma Encryption cores. As a result of using this design flow, we are able to efficiently implement our System and algorithms with a significant improvement on traditional design times, without compromise for performance.
-
Using System Generator to design a reconfigurable video Encryption System
Lecture Notes in Computer Science, 2003Co-Authors: Daniel Denning, Neil Harold, Malachy Devlin, James IrvineAbstract:In this paper, we discuss the use of System Generator to design a reconfigurable video Encryption System. It includes the design of the AES (Advanced Encryption System) and Enigma Encryption cores. As a result of using this design flow, we are able to efficiently implement our System and algorithms with a significant improvement on traditional design times, without compromise for performance.
Neil Harold - One of the best experts on this subject based on the ideXlab platform.
-
FPL - Using System Generator to Design a Reconfigurable Video Encryption System
Field Programmable Logic and Application, 2003Co-Authors: Daniel Denning, Neil Harold, Malachy Devlin, James IrvineAbstract:In this paper, we discuss the use of System Generator to design a reconfigurable video Encryption System. It includes the design of the AES (Advanced Encryption System) and Enigma Encryption cores. As a result of using this design flow, we are able to efficiently implement our System and algorithms with a significant improvement on traditional design times, without compromise for performance.
-
Using System Generator to design a reconfigurable video Encryption System
Lecture Notes in Computer Science, 2003Co-Authors: Daniel Denning, Neil Harold, Malachy Devlin, James IrvineAbstract:In this paper, we discuss the use of System Generator to design a reconfigurable video Encryption System. It includes the design of the AES (Advanced Encryption System) and Enigma Encryption cores. As a result of using this design flow, we are able to efficiently implement our System and algorithms with a significant improvement on traditional design times, without compromise for performance.
Jung-hui Chiu - One of the best experts on this subject based on the ideXlab platform.
-
An OFDM-Based Speech Encryption System without Residual Intelligibility
IEICE Transactions on Information and Systems, 2008Co-Authors: Der-chang Tseng, Jung-hui ChiuAbstract:Since an FFT-based speech Encryption System retains a considerable residual intelligibility, such as talk spurts and the original intonation in the encrypted speech, this makes it easy for eavesdroppers to deduce the information contents from the encrypted speech. In this letter, we propose a new technique based on the combination of an orthogonal frequency division multiplexing (OFDM) scheme and an appropriate QAM mapping method to remove the residual intelligibility from the encrypted speech by permuting several frequency components. In addition, the proposed OFDM-based speech Encryption System needs only two FFT operations instead of the four required by the FFT-based speech Encryption System. Simulation results are presented to show the effectiveness of this proposed technique.