Preferred Language
Articles
/
bsj-4033
Improved throughput of Elliptic Curve Digital Signature Algorithm (ECDSA) processor implementation over Koblitz curve k-163 on Field Programmable Gate Array (FPGA)
...Show More Authors

            The widespread use of the Internet of things (IoT) in different aspects of an individual’s life like banking, wireless intelligent devices and smartphones has led to new security and performance challenges under restricted resources. The Elliptic Curve Digital Signature Algorithm (ECDSA) is the most suitable choice for the environments due to the smaller size of the encryption key and changeable security related parameters. However, major performance metrics such as area, power, latency and throughput are still customisable and based on the design requirements of the device.

The present paper puts forward an enhancement for the throughput performance metric by proposing a more efficient design for the hardware implementation of ECDSA. The design raised the throughput to 0.08207 Mbit/s, leading to an increase of 6.95% from the existing design. It also includes the design and implementation of the Universal Asynchronous Receiver Transmitter (UART) module. The present work is based on a 163-bit key-size over Koblitz curve k-163 and secure hash function SHA-1. A serial module for the underlying modular layer, high-speed architecture of Koblitz point addition and Koblitz point multiplication have been considered in this work, in addition to utilising the carry-save-multiplier, modular adder-subtractor and Extended Euclidean module for ECDSA protocols. All modules are designed using VHDL and implemented on the platform Virtex5 xc5vlx155t-3ff1738. Signature generation requires 0.55360ms, while its validation consumes 1.10947288ms. Thus, the total time required to complete both processes is equal to 1.66ms and the maximum frequency is approximately 83.477MHZ, consuming a power of 99mW with the efficiency approaching 3.39 * 10-6.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Mar 15 2022
Journal Name
Arab Science Heritage Journal
قراءة في المصدر واسم المصدر على وفق الاستعمال
...Show More Authors

What linguists mentioned about the infinitive and its use in the linguistic levels of speech, whether with its verb, or what was mentioned in the difference between the infinitive and the noun of the source, are matters that are related to the phenomenon of hearing in speech, a need necessitated by the nature of the linguistic law and its connection with the Arabic dialects, which proceeded in the linguistic levels to form Phenomenon inherent in the use of the source and the name of the source

View Publication Preview PDF
Publication Date
Tue Aug 15 2023
Journal Name
Journal Of Economics And Administrative Sciences
Estimating Demand for Imported Food Categories in Iraq
...Show More Authors

Iraq is highly dependent on international markets to provide food for its residents. As imported food prices are highly dependent on crude oil prices in global markets, any shock in oil prices will have an impact on food consumption in the country. As a result, it is essential to study the demand for imported food at every time period. To the best of our knowledge as researchers, as not even a single study is available in the literature, this paper is considered the first to study the demand for imported food groups in Iraq. Therefore, the main objective of this research is to estimate demand elasticities for several imported food categories in Iraq. This study uses an Almost Ideal Demand System model to analyze the demand for imported f

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 01 2017
Journal Name
Journal Of The College Of Languages (jcl)
ההשגה על טקסטי התנ"ך ביצירות סופרים עבריים פרופ. עוזר ד"ר. עדנאן שביב ג'אסם
...Show More Authors

תקציר

העיון הזה מדבר על דבר ההשגה על הטקסטים המקראיים בידי כמה מסופרים ופילוסופים יהודים אשר הושפעו מהרעיונותיהם של הפילוסופים האירופיים מחד גיסא, ואת הרעיונות של ההשכלה מאידך גיסא. היהודים היו חיים בבידוד, ותחת השליטה של הרבנות (רבנים) שהייתה שליטה מוחלטת. כבר העבודה של הרבנות מאז ימי קדם להעלות רעיונות במוחם של היהודים בתור העם הנבחר, והם מעולים ועדיפים על בני אדם. הם כל כך מסתמכים על פסוקים מה

... Show More
View Publication Preview PDF
Publication Date
Sat Aug 10 2013
Journal Name
Journal Of Accounting And Financial Studies (jafs)
التهرب الضريبي واثره على التنمية الاقتصادية في العراق
...Show More Authors

Highlights the role of taxes in being a major source of funding sources internal economic and social development, and then, any decrease in tax revenue caused by tax evasion, for example, would weaken the government's ability to finance their investments and core financing private sector investment as a result of reduced ability to increase their reserves's cash banks, as well as the weakening of the effectiveness of tax evasion taxes as a tool to guide economic activity in the framework of service for development, and to achieve justice. And the statement of the reasons for and methods of evasion mandated to pay the tax due on them, whether legitimately or illegal with the statement of the proposed methods to tackle tax evasion and elimina

... Show More
Preview PDF
Publication Date
Fri Mar 19 2004
Journal Name
Association Of Arab Universities Journal Of Engineering
تأثير وجود المحرمات على تنامي الفشل في المنحدرات
...Show More Authors

Publication Date
Sun Apr 01 2007
Journal Name
Journal Of Educational And Psychological Researches
العولمة وانعكاسها على التذوق الفني لطلبة المرحلة الاعدادية
...Show More Authors

 

مشكلة البحث

              وتعد مرحلة المراهقة من اصعب المراحل التي يمر بها الفرد واخطرها اذ يطلق عليها بمرحلة التفكير المجرد ، وهي مرحلة حاسمة في حياته اذ تتكون لديه معالم الشخصية .أنهم خزين الامة الحقيقي من الطاقات الحيوية التي لا تنضب لذا يجب الاهتمام بهذه الشريحة من المجتمع وتطويرهم وتوجيههم لاسلم الطرق للحفاظ على مستقبلهم ومستقبل الا

... Show More
View Publication Preview PDF
Publication Date
Thu Jul 01 2010
Journal Name
Political Sciences Journal
اضاءات على الانتخابات الشريعية في العراق عام 2010
...Show More Authors

اضاءات على الانتخابات الشريعية في العراق عام 2010

View Publication Preview PDF
Crossref
Publication Date
Thu Sep 15 2022
Journal Name
Al-academy
Production mechanisms and their implications for Iraqi theater techniques
...Show More Authors

Theatrical production mechanisms were determined according to the extents of the theatrical performance, the directing plan, and the ideas that the theatrical performance seeks to convey to the audience. Accordingly, theatrical production mechanisms differ between one theatrical performance and another according to the requirements of each of them and the surrounding circumstances that accompany the production of theatrical performance, and in order to search for production mechanisms and their repercussions on the show. Theatrical The current research was divided into four chapters, namely (Chapter One - Methodology), which identified the research problem in the following question: What are the production mechanisms and their implicatio

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Feb 04 2022
Journal Name
Neuroquantology
Detecting Damaged Buildings on Post-Hurricane Satellite Imagery based on Transfer Learning
...Show More Authors

In this article, Convolution Neural Network (CNN) is used to detect damage and no damage images form satellite imagery using different classifiers. These classifiers are well-known models that are used with CNN to detect and classify images using a specific dataset. The dataset used belongs to the Huston hurricane that caused several damages in the nearby areas. In addition, a transfer learning property is used to store the knowledge (weights) and reuse it in the next task. Moreover, each applied classifier is used to detect the images from the dataset after it is split into training, testing and validation. Keras library is used to apply the CNN algorithm with each selected classifier to detect the images. Furthermore, the performa

... Show More
View Publication
Scopus (3)
Scopus Crossref
Publication Date
Wed Feb 10 2016
Journal Name
Scientific Reports
Experimental demonstration on the deterministic quantum key distribution based on entangled photons
...Show More Authors

As an important resource, entanglement light source has been used in developing quantum information technologies, such as quantum key distribution(QKD). There are few experiments implementing entanglement-based deterministic QKD protocols since the security of existing protocols may be compromised in lossy channels. In this work, we report on a loss-tolerant deterministic QKD experiment which follows a modified “Ping-Pong”(PP) protocol. The experiment results demonstrate for the first time that a secure deterministic QKD session can be fulfilled in a channel with an optical loss of 9 dB, based on a telecom-band entangled photon source. This exhibits a conceivable prospect of ultilizing entanglement light source in real-life fiber-based

... Show More
View Publication
Scopus (17)
Crossref (16)
Scopus Clarivate Crossref