A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Sureshkumar, N.
- Parameter Extraction of Planar Transmission Line Structure By ADI-FDTD Method
Authors
1 Electronics and Communication Engineering Department, Velammal College of Engineering and Technology, Madurai, TamilNadu, IN
2 Velammal College of Engineering and Technology, Madurai, TamilNadu, IN
3 Electronics and Communication Engineering Department, Thiagarajar College of Engineering, Madurai, TamilNadu, IN
Source
Wireless Communication, Vol 1, No 7 (2009), Pagination: 329-338Abstract
As very large scale integration (VLSI) technology shrinks to Deep Sub Micron (DSM) geometries, interconnect is becoming a limiting factor in determining circuit performance. High speed interconnect suffers from signal integrity effects like crosstalk, and propagation delay thereby degrading the entire system operation. In order to reduce the adverse signal integrity effects, if is necessary for the interconnect to have accurate physical dimensions. The interconnection and packaging related issues are main factors that determine the number of circuits that can be integrated in a chip as well as the chip performance. In this paper, it is proposed to simulate high speed interconnect structure using Alternate Direction Implicit Finite-Difference Time-Domain Method (ADI-FDTD) method.
Keywords
High Speed Interconnects, Microstripline, Signal Integrity, ADI-FDTD Method.- Implementation of Security Package for Data Integrity with Various Hash Algorithms
Authors
1 Department of Electronics and Communication Engineering, Velammal College of Engineering & Technology, Madurai, Tamil Nadu, IN
2 Velammal College of Engineering & Technology, Madurai, Tamil Nadu, IN
Source
Networking and Communication Engineering, Vol 1, No 8 (2009), Pagination: 472-478Abstract
This paper deals with the implementation of security package of Hash algorithms which can be chosen by the user for their desired level of security. The concept of encryption and decryption of message is not enough for the security of data’s in current communication. Hence the concept of Message authentication is developed. One type of authentication is by Hash algorithm. Hash algorithm creates the miniature of the message. Hash algorithm takes an input message of length less than 264 (varies with the type of algorithm) and gives the output in fixed length. For the application point of view we need the comparison of their performance. Hence this paper involves the following categories.
a Implementation of MD5 algorithm
b Implementation of SHA algorithm
c Implementation of RIPEMD algorithm
d Comparison of algorithms with respect to their
a. Speed
b. Security
e Implementation of software package.