Now showing items 1-6 of 6

    • Fairness Notions on Hardware Resource Configuration 

      Vellora Vayalapra, Aravind (University of Waterloo, 2023-10-26)
      To meet performance and energy efficiency demand of modern workloads, specialized hardware accelerators implemented on FPGAs or ASICs have found adoption in modern servers and Systems-on-Chip (SoC). These hardware accelerators ...
    • Hardware Implementations of the Lightweight Welch-Gong Stream Cipher Family using Polynomial Bases 

      Sattarov, Marat (University of Waterloo, 2019-01-28)
      In this thesis we develop a parametrized generic hardware implementation for the Welch-Gong (WG) stream cipher family for low power and low cost applications. WG stream ciphers operate over finite fields, and are comprised ...
    • High Performance Elliptic Curve Cryptographic Co-processor 

      Lutz, Jonathan (University of Waterloo, 2003)
      In FIPS 186-2, NIST recommends several finite fields to be used in the elliptic curve digital signature algorithm (ECDSA). Of the ten recommended finite fields, five are binary extension fields with degrees ranging ...
    • Implementing Real-Time Video Deblocking in FPGA Hardware 

      Hansen, Martin (University of Waterloo, 2007-05-10)
      Video compression techniques are commonly used to meet the increasing demands for the storage and transmission of digital video content. Popular video compression techniques such as MPEG video encoding make use of ...
    • Simplifying the Creation of Multi-core Processors: An Interconnection Architecture and Tool Framework 

      Grossman, Samuel Robert (University of Waterloo, 2012-04-25)
      The contribution of this thesis is two-fold: an on-chip interconnection architecture designed specifically for multi-core processors and a tool framework that simplifies the process of designing a multi-core processor. ...
    • Verification of Pipelined Ciphers 

      Lam, Chiu Hong (University of Waterloo, 2009-01-29)
      The purpose of this thesis is to explore the formal verification technique of completion functions and equivalence checking by verifying two pipelined cryptographic circuits, KASUMI and WG ciphers. Most of current methods ...

      UWSpace

      University of Waterloo Library
      200 University Avenue West
      Waterloo, Ontario, Canada N2L 3G1
      519 888 4883

      All items in UWSpace are protected by copyright, with all rights reserved.

      DSpace software

      Service outages