Non-Interactive Secure Computation Based on Cut-and-Choose

Size: px
Start display at page:

Download "Non-Interactive Secure Computation Based on Cut-and-Choose"

Transcription

1 Non-Interactive Secure Computation Based on Cut-and-Choose Arash Afshar, Payman Mohassel, Benny Pinkas, and Ben Riva May 14, 2014 Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

2 Overview The Big Picture Secure Two Party Computation (2PC) In presence of malicious/active adversaries. Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

3 Overview The Big Picture Secure Two Party Computation (2PC) In presence of malicious/active adversaries. Non-interactive computation A single message is sent and a single message received. First Message Second Message Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

4 Overview The Big Picture Secure Two Party Computation (2PC) In presence of malicious/active adversaries. Non-interactive computation A single message is sent and a single message received. Practical 6.4 seconds for AES circuit evaluation on a common laptop. Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

5 Overview Motivation Alice Online/Bob offline General private computation. Asynchronous communications (i.e. ). Example usecases: Private Set Intersection DNA ancestry computation... Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

6 Overview Motivation Alice offline/bob online General private computation. Asynchronous communications (i.e. ). Example usecases: Private Set Intersection DNA ancestry computation... Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

7 Overview Motivation Alice offline/bob online General private computation. Asynchronous communications (i.e. ). Example usecases: Private Set Intersection DNA ancestry computation... Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

8 Overview Motivation Alice offline/bob online General private computation. Asynchronous communications (i.e. ). Example usecases: Private Set Intersection DNA ancestry computation... Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

9 Overview Motivation Alice Online/Bob offline General private computation. Asynchronous communications (i.e. ). Example usecases: Private Set Intersection DNA ancestry computation... Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

10 Overview Motivation Alice Online/Bob offline General private computation. Asynchronous communications (i.e. ). Example usecases: Private Set Intersection DNA ancestry computation... Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

11 2PC Approaches Outline 1 Overview 2 2PC Approaches Security Definition Semi-honest Malicious 3 Protocol Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

12 2PC Approaches Security Definition Security of 2PC Malicious adversary: might deviate from the protocol Computationally bounded adversary. Security is proved by simulation in Real/Ideal-world paradigm. If an attack can be launched in Real-world, then, Ideal-world will be compromised. Real World Ideal World Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

13 2PC Approaches Semi-honest 2PC Using Yao (Non-interactive) Semi-honest setting. Easy to change to NISC. Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

14 2PC Approaches Semi-honest 2PC Using Yao (Non-interactive) Semi-honest setting. Easy to change to NISC. Fix terminology of the roles. Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

15 2PC Approaches Semi-honest 2PC Using Yao (Non-interactive) Semi-honest setting. Easy to change to NISC. Fix terminology of the roles. 2 message, universally composable OT [PVW08]. Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

16 2PC Approaches Semi-honest 2PC Using Yao (Non-interactive) Semi-honest setting. Easy to change to NISC. Fix terminology of the roles. 2 message, universally composable OT [PVW08]. First Message Sends his inputs as OT inputs. Inputs as OT Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

17 2PC Approaches Semi-honest 2PC Using Yao (Non-interactive) Semi-honest setting. Easy to change to NISC. Fix terminology of the roles. 2 message, universally composable OT [PVW08]. First Message Sends his inputs as OT inputs. Second Message Sends his garbled inputs. Sends the garbled circuit. Sends OT answers corresponding to the Receiver s input. Inputs as OT OT Answers, Garbled Inputs, Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

18 2PC Approaches Semi-honest 2PC Using Yao (Non-interactive) Semi-honest setting. Easy to change to NISC. Fix terminology of the roles. 2 message, universally composable OT [PVW08]. First Message Sends his inputs as OT inputs. Second Message Sends his garbled inputs. Sends the garbled circuit. Sends OT answers corresponding to the Receiver s input. Receiver Evaluates the circuit. Inputs as OT OT Answers, Garbled Inputs, Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

19 2PC Approaches Malicious Malicious 2PC Approaches (constant round approaches) Not so easy! Interactive Non-interactive Not Practical Asymptotically Efficient Highly Practical Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

20 2PC Approaches Malicious Malicious 2PC Approaches (constant round approaches) Not so easy! A spectrum of approaches! Interactive Non-interactive Not Practical Yao+ZKP Yao+ZKP Asymptotically Efficient Highly Practical Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

21 2PC Approaches Malicious Malicious 2PC Approaches (constant round approaches) Not so easy! A spectrum of approaches! Interactive Non-interactive Not Practical Yao+ZKP Yao+ZKP Asymptotically Efficient MPC-in-the-head [IKO + 11] MPC-in-the-head [IKO + 11] Highly Practical Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

22 2PC Approaches Malicious Malicious 2PC Approaches (constant round approaches) Not so easy! A spectrum of approaches! Interactive Non-interactive Not Practical Yao+ZKP Yao+ZKP Asymptotically Efficient MPC-in-the-head [IKO + 11] MPC-in-the-head [IKO + 11] Highly Practical Cut-and-Choose [Lin13] Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

23 2PC Approaches Malicious Malicious 2PC Approaches (constant round approaches) Not so easy! A spectrum of approaches! Can we make Cut-and-Choose 2PC non-interactive? Interactive Non-interactive Not Practical Yao+ZKP Yao+ZKP Asymptotically Efficient MPC-in-the-head [IKO + 11] MPC-in-the-head [IKO + 11] Highly Practical Cut-and-Choose [Lin13] Our Approach! Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

24 Outline 1 Overview 2 2PC Approaches 3 Protocol Contributions Implementation Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

25 Contributions Contributions Practical NISC with small overhead based on Cut-and-Choose 2PC As efficient as the state of the art [Lin13]. First implementation of NISC. Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

26 Making Cut-and-Choose Practical Cut-and-Choose Components Checking circuits via Cut-and-Choose. Input consistency. Cheating Recovery. Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

27 Cut-and-Choose Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

28 Cut-and-Choose Construction Attack? Malicious Sender garbles different circuits. instead of Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

29 Cut-and-Choose Construction Attack? Malicious Sender garbles different circuits. Cut-and-Choose Solution? Sender garbles many circuits (i.e. around Ω(t) for 2 t security). Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

30 Cut-and-Choose Construction Attack? Malicious Sender garbles different circuits. Cut-and-Choose Solution? Sender garbles many circuits (i.e. around Ω(t) for 2 t security). Receiver randomly chooses half of them. C&C Choices Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

31 Cut-and-Choose Construction Attack? Malicious Sender garbles different circuits. Cut-and-Choose Solution? Sender garbles many circuits (i.e. around Ω(t) for 2 t security). Receiver randomly chooses half of them. Sender opens the selected circuits. C&C Choices Opening For half Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

32 Cut-and-Choose Construction Attack? Malicious Sender garbles different circuits. Cut-and-Choose Solution? Sender garbles many circuits (i.e. around Ω(t) for 2 t security). Receiver randomly chooses half of them. Sender opens the selected circuits. Receiver evaluates the other half and returns the majority result. Garbled Inputs Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

33 Cut-and-Choose Overhead Cost? Adds an extra round (2 messages). At least, an overhead of 3t in computation and communication. Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

34 Cut-and-Choose Overhead Cost? Adds an extra round (2 messages). At least, an overhead of 3t in computation and communication. Problem: Sender s Input Consistency Malicious Sender may send different inputs to different circuits. inp2 inp2 inp2 diff inp2 Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

35 Non-interactive Cut-and-Choose Receiver s Message: Same as before C&C Choices as OT inputs Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

36 Non-interactive Cut-and-Choose Receiver s Message: Same as before Sender s Response: Garbled circuits. Circuit openings and garbled inputs as OT response. C&C Choices as OT inputs OT Circuits Opennings Garbled Inputs Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

37 Non-interactive Cut-and-Choose Receiver s Message: Same as before Sender s Response: Garbled circuits. Circuit openings and garbled inputs as OT response. Receiver s Computation: For each circuit Receives either the opening or the keys for evaluation C&C Choices as OT inputs OT Circuits Opennings Garbled Inputs Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

38 Input Consistency Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

39 Input Consistency Receiver s input consistency: Attack: Selective OT Attack. Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

40 Input Consistency Receiver s input consistency: Attack: Selective OT Attack. Defense: Modified ideas of [LP11] and [SS11]. Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

41 Input Consistency Receiver s input consistency: Attack: Selective OT Attack. Defense: Modified ideas of [LP11] and [SS11]. Sender s input consistency: Attack: Sender sends different inputs to different circuits. inp2 inp2 inp2 diff inp2 Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

42 Input Consistency Receiver s input consistency: Attack: Selective OT Attack. Defense: Modified ideas of [LP11] and [SS11]. Sender s input consistency: Attack: Sender sends different inputs to different circuits. Interactive Defense: Different solutions with different costs! State of the art: [MR13] and [ss13] inp2 inp2 inp2 diff inp2 Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

43 NISC Input Consistency Sender Commits to original values. EG 0 i,eg1 i Circ Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

44 NISC Input Consistency Sender Commits to original values. Garbles 3t copies of the circuit. EG 0 i,eg1 i Circ EG 0 i,j,eg1 i,j j EG 0 i,j,eg1 i,j j Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

45 NISC Input Consistency Sender Commits to original values. Garbles 3t copies of the circuit. From different seeds. EG 0 i,eg1 i Circ EG 0 i,j,eg1 i,j j seed j EG 0 i,j,eg1 i,j j seed j Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

46 NISC Input Consistency Sender Commits to original values. Garbles 3t copies of the circuit. From different seeds. Generates equality proofs. EG 0 i,eg1 i equality proof 1 i,j equality proof 0 i,j Circ EG 0 i,j,eg1 i,j EG 0 i,j,eg1 i,j j seed j equality proof 0 i,j j equality proof 1 i,j seed j Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

47 NISC Input Consistency enc( k 1, )=msg 1 j j Sender Commits to original values. Garbles 3t copies of the circuit. From different seeds. Generates equality proofs. enc( k 0, )=msg 0 j j EG 0 i,eg1 i equality proof 1 i,j equality proof 0 i,j Circ EG 0 i,j,eg1 i,j EG 0 i,j,eg1 i,j j seed j Hides equality proofs. equality proof 0 i,j j equality proof 1 i,j enc( k0, )=msg 0 j j seed j enc( k1, )=msg 1 j j Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

48 NISC Input Consistency First Message: The same as Cut-and-Choose. C&C Choices as OT inputs Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

49 NISC Input Consistency First Message: The same as Cut-and-Choose. Second Message: Garbled circuits C&C Choices as OT inputs Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

50 NISC Input Consistency First Message: The same as Cut-and-Choose. Second Message: Garbled circuits Encrypted proofs of equality. C&C Choices as OT inputs, msg,, Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

51 NISC Input Consistency First Message: The same as Cut-and-Choose. Second Message: Garbled circuits Encrypted proofs of equality. OT response. C&C Choices as OT inputs, msg,, OT seeds, k 0,k 1, Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

52 NISC Input Consistency First Message: The same as Cut-and-Choose. Second Message: Garbled circuits Encrypted proofs of equality. OT response. Computation: Opened circuits: Checks commitments. C&C Choices as OT inputs, msg,, OT seeds, k 0,k 1, Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

53 NISC Input Consistency First Message: The same as Cut-and-Choose. Second Message: Garbled circuits Encrypted proofs of equality. OT response. Computation: Opened circuits: Checks commitments. Evaluated circuits: Checks equality. C&C Choices as OT inputs, msg,, OT seeds, k 0,k 1, Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

54 Cheating Recovery Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

55 Cheating Recovery Goal Reducing the 3t circuit overhead to t for security of 2 t. No majority checking. At least one correct circuit. 3t t 2 t 2 t Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

56 Cheating Recovery The idea: Recover Sender s input two different output wire values. Recoverable?? Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

57 Cheating Recovery With t circuits, input cannot be recovered if all evaluating are the same and correct. Won t punish honest Sender. Not Recoverable Desirable! Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

58 Cheating Recovery With t circuits, input cannot be recovered if all evaluating are the same and incorrect. 2 t failure probability. Not Recoverable Not Desirable! Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

59 Cheating Recovery (cont.) How? Use extra malicious 2PC [Lin13], on a small circuit. Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

60 Cheating Recovery (cont.) How? Use extra malicious 2PC [Lin13], on a small circuit. cost? Extra rounds for the extra 2PC. Small computation and communication overhead for the extra 2PC. Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

61 NISC cheating recovery First message: Nothing! Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

62 NISC cheating recovery First message: Nothing! Second message: Change input labels to ElGamal commitments. A, B EG 0, EG 1 i E, F Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

63 NISC cheating recovery First message: Nothing! Second message: Change input labels to ElGamal commitments. Assume a trapdoor w. A, B EG 0, EG 1 i E, F w trapdoor Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

64 NISC cheating recovery First message: Nothing! Second message: Change input labels to ElGamal commitments. Assume a trapdoor w. Recover trapdoor (partly), using output labels. A, B EG 0, EG 1 i E, F w trapdoor split w j,0 w j,1 Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

65 NISC cheating recovery First message: Nothing! Second message: Change input labels to ElGamal commitments. Assume a trapdoor w. Recover trapdoor (partly), using output labels. A, B EG 0, EG 1 i E, F enc(k i,j,0 ) enc(k i,j,1 ) w trapdoor split w j,0 w j,1 blinds with k i,j,0 k i,j,1 Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

66 NISC cheating recovery First message: Nothing! Second message: Change input labels to ElGamal commitments. Assume a trapdoor w. Recover trapdoor (partly), using output labels. Computation: No cheating learn one w j,b. A, B EG 0, EG 1 i E, F enc(k i,j,0 ) enc(k i,j,1 ) w trapdoor split w j,0 w j,1 blinds with k i,j,0 k i,j,1 Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

67 NISC cheating recovery First message: Nothing! Second message: Change input labels to ElGamal commitments. Assume a trapdoor w. Recover trapdoor (partly), using output labels. Computation: No cheating learn one w j,b. Cheating learn both w j,b. A, B EG 0, EG 1 i E, F enc(k i,j,0 ) enc(k i,j,1 ) w trapdoor split w j,0 w j,1 blinds with k i,j,0 k i,j,1 Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

68 Implementation Implementation Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

69 Implementation Results Experimented on a Linux VM on a laptop 64bit, i7-4650u, 1.70GHz and 5.4GB of RAM. Used only one core. Enabled AES-NI instructions set. AES circuit (with 8,492 non-xor and 25,124 XOR gates). 6.4 seconds Libraries used: JustGarble [BHKR13], OpenSSL, RELIC-toolkit. Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

70 Implementation Observations Module or part name Time(sec.) Time(sec.) AES circuit SHA256 circuit First message Second message Receiver s computation Cheating recovery < 0.01 < 0.01 Total time I/O time Figure : For t = 40 Very small Garbling time. Cheating recovery time. Bottlenecks Exponentiations (Elliptic curve multiplication) IO (used file for communications) Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

71 Implementation Observations Module or part name Time(sec.) Time(sec.) AES circuit SHA256 circuit Total time I/O time Non-I/O time Figure : For t = 40 SHA256 garbled circuit size is 10 times larger. Same input size, different output size Resulting in Large increase in IO. Small increase in non-io. Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

72 Implementation Thank You! Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

73 Implementation References Mihir Bellare, Viet Tung Hoang, Sriram Keelveedhi, and Phillip Rogaway. Efficient garbling from a fixed-key blockcipher. In IEEE S&P, Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Manoj Prabhakaran, and Amit Sahai. Efficient non-interactive secure computation. In EUROCRYPT, pages Springer-Verlag, Yehuda Lindell. Fast cut-and-choose based protocols for malicious and covert adversaries. In CRYPTO, pages 1 17, Yehuda Lindell and Benny Pinkas. Secure two-party computation via cut-and-choose oblivious transfer. In TCC, pages Springer, Payman Mohassel and Ben Riva. Garbled circuits checking garbled circuits: More efficient and secure two-party computation. In CRYPTO, pages 36 53, Chris Peikert, Vinod Vaikuntanathan, and Brent Waters. A framework for efficient and composable oblivious transfer. In CRYPTO, Abhi Shelat and Chih-Hao Shen. Two-output secure computation with malicious adversaries. In EUROCRYPT, pages Springer, abhi shelat and Chih-hao Shen. Fast two-party secure computation with minimal assumptions. In CCS, pages ACM, Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

74 Implementation resources... SHA256 circuit (with 194,083 non-xor gates and 42,029 XOR gates). AES circuit (with 8,492 non-xor and 25,124 XOR gates). Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based on Cut-and-Choose May 14, / 29

CAAD CTF 2018 Rules June 21, 2018 Version 1.1

CAAD CTF 2018 Rules June 21, 2018 Version 1.1 CAAD CTF 2018 Rules June 21, 2018 Version 1.1 The organizer will invite 5 teams to participate CAAD CTF 2018. We will have it in Las Vegas on Aug. 10 th, 2018. The rules details are below: 1. Each team

More information

Dealing with Dependent Failures in Distributed Systems

Dealing with Dependent Failures in Distributed Systems Dealing with Dependent Failures in Distributed Systems Ranjita Bhagwan, Henri Casanova, Alejandro Hevia, Flavio Junqueira, Yanhua Mao, Keith Marzullo, Geoff Voelker, Xianan Zhang University California

More information

Provably Secure Camouflaging Strategy for IC Protection

Provably Secure Camouflaging Strategy for IC Protection Provably Secure Camouflaging Strategy for IC Protection Meng Li 1 Kaveh Shamsi 2 Travis Meade 2 Zheng Zhao 1 Bei Yu 3 Yier Jin 2 David Z. Pan 1 1 Electrical and Computer Engineering, University of Texas

More information

Hierarchical ORAM Revisited, and Applications to Asymptotically Efficient ORAM and OPRAM. Hubert Chan, Yue Guo, Wei-Kai Lin, Elaine Shi 2017/12/5

Hierarchical ORAM Revisited, and Applications to Asymptotically Efficient ORAM and OPRAM. Hubert Chan, Yue Guo, Wei-Kai Lin, Elaine Shi 2017/12/5 Hierarchical ORAM Revisited, and Applications to Asymptotically Efficient ORAM and OPRAM Hubert Chan, Yue Guo, Wei-Kai Lin, Elaine Shi 2017/12/5 Random Access Machine, RAM Maybe the standard model of algorithms

More information

Three-Dimensional Ray-Cast Pong

Three-Dimensional Ray-Cast Pong Three-Dimensional Ray-Cast Pong Richard Hughes Elizabeth Power! Overview What is Pong? Traditional Pong is a two-dimensional game that simulates table tennis. The player controls a paddle by moving it

More information

SNARKs with Preprocessing. Eran Tromer

SNARKs with Preprocessing. Eran Tromer SNARKs with Preprocessing Eran Tromer BIU Winter School on Verifiable Computation and Special Encryption 4-7 Jan 206 G: Someone generates and publishes a common reference string P: Prover picks NP statement

More information

Getting Started with the LabVIEW Toolkit for LEGO MINDSTORMS NXT

Getting Started with the LabVIEW Toolkit for LEGO MINDSTORMS NXT Getting Started with the LabVIEW Toolkit for LEGO MINDSTORMS NXT Contents Overview...2 Mass Compiling...2 Building a LabVIEW VI that Runs on the NXT...3 Running a LabVIEW VI on the NXT...4 Building a LabVIEW

More information

Artificial Intelligence for the EChO Mission Scheduler

Artificial Intelligence for the EChO Mission Scheduler Artificial Intelligence for the EChO Mission Scheduler Álvaro García Piquer Ignasi Ribas Josep Colomé Institute of Space Sciences (CSIC/IEEC), Barcelona, Spain SCIOPS 2013 September 10 13, 2013 Introduction

More information

UNIVERSITY OF WATERLOO

UNIVERSITY OF WATERLOO UNIVERSITY OF WATERLOO Department of Chemical Engineering ChE 524 Process Control Laboratory Instruction Manual January, 2001 Revised: May, 2009 1 Experiment # 2 - Double Pipe Heat Exchanger Experimental

More information

Spacecraft Simulation Tool. Debbie Clancy JHU/APL

Spacecraft Simulation Tool. Debbie Clancy JHU/APL FSW Workshop 2011 Using Flight Software in a Spacecraft Simulation Tool Debbie Clancy JHU/APL debbie.clancy@jhuapl.edu 443-778-7721 Agenda Overview of RBSP and FAST Technical Challenges Dropping FSW into

More information

Design Strategies for ARX with Provable Bounds: SPARX and LAX

Design Strategies for ARX with Provable Bounds: SPARX and LAX Design Strategies for ARX with Provable Bounds: SPARX and LAX Daniel Dinu 1, Léo Perrin 1, Aleksei Udovenko 1, Vesselin Velichkov 1, Johann Großschädl 1, Alex Biryukov 1 1 SnT, University of Luxembourg

More information

Queue analysis for the toll station of the Öresund fixed link. Pontus Matstoms *

Queue analysis for the toll station of the Öresund fixed link. Pontus Matstoms * Queue analysis for the toll station of the Öresund fixed link Pontus Matstoms * Abstract A new simulation model for queue and capacity analysis of a toll station is presented. The model and its software

More information

Reducing Code Size with Run-time Decompression

Reducing Code Size with Run-time Decompression Reducing Code Size with Run-time Decompression Charles Lefurgy, Eva Piccininni, and Trevor Mudge Advanced Computer Architecture Laboratory Electrical Engineering and Computer Science Dept. The University

More information

CONTROL LOGIC DESCRIPTION DOCUMENT IC-410ND

CONTROL LOGIC DESCRIPTION DOCUMENT IC-410ND Configuration # : 41G20F0 CONTROL LOGIC DESCRIPTION DOCUMENT IC-410ND Input/output table: Inputs Qty Outputs Qty Inside Temperature Probe 3 Inflatable Balloon 8 Chimney Temperature Probe 1 Chimney Activator

More information

Using MATLAB with CANoe

Using MATLAB with CANoe Version 2.0 2017-03-09 Application Note AN-IND-1-007 Author Restrictions Abstract Vector Informatik GmbH Public Document This application note describes the usage of MATLAB /Simulink combined with CANoe.

More information

Basic Autoclave #1 Ideal Gas Law, Inert Gas

Basic Autoclave #1 Ideal Gas Law, Inert Gas 11. Autoclaves 40 Overview An autoclave is a high pressure, high temperature hydrometallurgy unit with carefully controlled conditions. In this chapter, we will simulate an autoclave using two different

More information

Hydronic Systems Balance

Hydronic Systems Balance Hydronic Systems Balance Balancing Is Misunderstood Balancing is application of fundamental hydronic system math Balance Adjustment of friction loss location Adjustment of pump to requirements By definition:

More information

Imperfectly Shared Randomness in Communication

Imperfectly Shared Randomness in Communication Imperfectly Shared Randomness in Communication Madhu Sudan Harvard Joint work with Clément Canonne (Columbia), Venkatesan Guruswami (CMU) and Raghu Meka (UCLA). 11/16/2016 UofT: ISR in Communication 1

More information

EEC 686/785 Modeling & Performance Evaluation of Computer Systems. Lecture 6. Wenbing Zhao. Department of Electrical and Computer Engineering

EEC 686/785 Modeling & Performance Evaluation of Computer Systems. Lecture 6. Wenbing Zhao. Department of Electrical and Computer Engineering EEC 686/785 Modeling & Performance Evaluation of Computer Systems Lecture 6 Department of Electrical and Computer Engineering Cleveland State University wenbing@ieee.org Outline 2 Review of lecture 5 The

More information

C. Mokkapati 1 A PRACTICAL RISK AND SAFETY ASSESSMENT METHODOLOGY FOR SAFETY- CRITICAL SYSTEMS

C. Mokkapati 1 A PRACTICAL RISK AND SAFETY ASSESSMENT METHODOLOGY FOR SAFETY- CRITICAL SYSTEMS C. Mokkapati 1 A PRACTICAL RISK AND SAFETY ASSESSMENT METHODOLOGY FOR SAFETY- CRITICAL SYSTEMS Chinnarao Mokkapati Ansaldo Signal Union Switch & Signal Inc. 1000 Technology Drive Pittsburgh, PA 15219 Abstract

More information

Outline. Terminology. EEC 686/785 Modeling & Performance Evaluation of Computer Systems. Lecture 6. Steps in Capacity Planning and Management

Outline. Terminology. EEC 686/785 Modeling & Performance Evaluation of Computer Systems. Lecture 6. Steps in Capacity Planning and Management EEC 686/785 Modeling & Performance Evaluation of Computer Systems Lecture 6 Department of Electrical and Computer Engineering Cleveland State University wenbing@ieee.org Outline Review of lecture 5 The

More information

VLSI Design 12. Design Styles

VLSI Design 12. Design Styles 1 9 8 5 1 9 8 7 1 9 9 1 1 9 9 3 1 9 9 9 2 0 0 1 2 0 0 5 2 0 0 7 2 0 0 9 Pr odu ctiv it y (T r an s./ St a f -M o nt h ) VLSI Design Last module: Floorplanning Sequential circuit design Clock skew This

More information

HW #5: Digital Logic and Flip Flops

HW #5: Digital Logic and Flip Flops HW #5: Digital Logic and Flip Flops This homework will walk through a specific digital design problem in all its glory that you will then implement in this weeks lab. 1 Write the Truth Table (10 pts) Consider

More information

User manual. PCA EXCEL one4all with corridorfunction PCA T5 ECO lp with corridorfunction TE one4all with corridorfunction

User manual. PCA EXCEL one4all with corridorfunction PCA T5 ECO lp with corridorfunction TE one4all with corridorfunction User manual PCA EXCEL one4all with corridorfunction PCA T5 ECO lp with corridorfunction TE one4all with corridorfunction Contents 1 Introduction...2 2 Installation...2 3 Commissioning...3 4 corridorfunction

More information

Physical Design of CMOS Integrated Circuits

Physical Design of CMOS Integrated Circuits Physical Design of CMOS Integrated Circuits Dae Hyun Kim EECS Washington State University References John P. Uyemura, Introduction to VLSI Circuits and Systems, 2002. Chapter 5 Goal Understand how to physically

More information

- 2 - Companion Web Site. Back Cover. Synopsis

- 2 - Companion Web Site. Back Cover. Synopsis Companion Web Site A Programmer's Introduction to C# by Eric Gunnerson ISBN: 1893115860 Apress 2000, 358 pages This book takes the C programmer through the all the details from basic to advanced-- of the

More information

Iteration: while, for, do while, Reading Input with Sentinels and User-defined Functions

Iteration: while, for, do while, Reading Input with Sentinels and User-defined Functions Iteration: while, for, do while, Reading Input with Sentinels and User-defined Functions This programming assignment uses many of the ideas presented in sections 6 and 7 of the course notes. You are advised

More information

Blocking time reduction for level crossings using the genetic algorithm

Blocking time reduction for level crossings using the genetic algorithm Computers in Railways X 299 Blocking time reduction for level crossings using the genetic algorithm Y. Noguchi 1, H. Mochizuki 1, S. Takahashi 1, H. Nakamura 1, S. Kaneko 1 & M. Sakai 2 1 Nihon University,

More information

Software Reliability 1

Software Reliability 1 Software Reliability 1 Software Reliability What is software reliability? the probability of failure-free software operation for a specified period of time in a specified environment input sw output We

More information

SUPPLEMENT MATERIALS

SUPPLEMENT MATERIALS SUPPLEMENT MATERIALS This document provides the implementation details of LW-FQZip 2 and the detailed experimental results of the comparison studies. 1. Implementation details of LW-FQZip 2 LW-FQZip 2

More information

An Architecture for Combined Test Data Compression and Abort-on-Fail Test

An Architecture for Combined Test Data Compression and Abort-on-Fail Test An Architecture for Combined Test Data Compression and Abort-on-Fail Test Erik Larsson and Jon Persson Embedded Systems Laboratory Department of Computer and Information Science Linköpings Universitet,

More information

Automatic Isokinetic Sampler. ST5 Evo

Automatic Isokinetic Sampler. ST5 Evo Automatic Isokinetic Sampler ST5 Evo Automatic Isokinetic Sampler ST5 Evo Moreover, in case of pump failure, the CU can work with a spare Dado PU unit or with any pump capable to supply the needed flowrate,

More information

Track. Track return. Interval protocols. Phosphate Decrement Test (PDT) Modified PDT (10 x 40m on 30)

Track. Track return. Interval protocols. Phosphate Decrement Test (PDT) Modified PDT (10 x 40m on 30) Track o o o Free timing mode with 1-6 gates (Athletes can run through gates in any order, ideal for complex patterns) Standard timing (2-6 gates, timing intervals) Traffic light sprint (1-6 gates, start

More information

CS 341 Computer Architecture and Organization. Lecturer: Bob Wilson Cell Phone: or

CS 341 Computer Architecture and Organization. Lecturer: Bob Wilson Cell Phone: or CS 341 Computer Architecture and Organization Lecturer: Bob Wilson Cell Phone: 508-577-9895 Email: robert.wilson@umb.edu or bobw@cs.umb.edu 1 Welcome to CS341 This course teaches computer architecture

More information

Science&Motion. SAM BalanceLab. Sports. control the invisible. Most advanced pressure plate for coaching

Science&Motion. SAM BalanceLab. Sports. control the invisible. Most advanced pressure plate for coaching SAM BalanceLab Science&Motion Sports control the invisible Most advanced pressure plate for coaching Balance - the invisible key to success Stop the guesswork and start to rely on facts Science and Motion

More information

Well-formed Dependency and Open-loop Safety. Based on Slides by Professor Lui Sha

Well-formed Dependency and Open-loop Safety. Based on Slides by Professor Lui Sha Well-formed Dependency and Open-loop Safety Based on Slides by Professor Lui Sha Reminders and Announcements Announcements: CS 424 is now on Piazza: piazza.com/illinois/fall2017/cs424/home We must form

More information

Fast Software-managed Code Decompression

Fast Software-managed Code Decompression Fast Software-managed Code Decompression Charles Lefurgy and Trevor Mudge Advanced Computer Architecture Laboratory Electrical Engineering and Computer Science Dept. The University of Michigan, Ann Arbor

More information

Smart Card based application for IITK Swimming Pool management

Smart Card based application for IITK Swimming Pool management CS499 End Semester Report Smart Card based application for IITK Swimming Pool management Submitted By: Ankur Mittal Project Guide: Prof. Rajat Moona Introduction In today s world, there is an increasing

More information

A 64 Bit Pipeline Based Decimal Adder Using a New High Speed BCD Adder

A 64 Bit Pipeline Based Decimal Adder Using a New High Speed BCD Adder A 64 Bit Pipeline Based Decimal Adder Using a New High Speed BCD Adder Rahul Jain 1, Khushboo Singh 2, Ghanshyam Jangid 3 1 Assistant Professor GIT College Jaipur, Rajasthan, India 2 M.Tech Student, Suresh

More information

The Constrained Ski-Rental Problem and its Application to Online Cloud Cost Optimization

The Constrained Ski-Rental Problem and its Application to Online Cloud Cost Optimization The Constrained Ski-Rental Problem and its Application to Online Cloud Cost Optimization Ali Khanafer *, Murali Kodialam **, Krishna P. N. Puttaswamy ** * Coordinated Science Laboratory, UIUC ** Bell Laboratories,

More information

Stack Height Analysis for FinFET Logic and Circuit

Stack Height Analysis for FinFET Logic and Circuit 2015 Spring ECE 7332 Stack Height Analysis for FinFET Logic and Circuit Xinfei Guo & Qing Qin May 8 th, 2015 Outline Background & Motivation FinFET Design and Simulation Flow Stack Height Analysis A Case

More information

MPCS: Develop and Test As You Fly for MSL

MPCS: Develop and Test As You Fly for MSL MPCS: Develop and Test As You Fly for MSL GSAW 2008 Michael Tankenson & Lloyd DeForrest Wednesday April 2, 2008 Copyright 2008 California Institute of Technology. Government sponsorship acknowledged. Mission

More information

A Novel Decode-Aware Compression Technique for Improved Compression and Decompression

A Novel Decode-Aware Compression Technique for Improved Compression and Decompression A Novel Decode-Aware Compression Technique for Improved Compression and Decompression J. Suresh Babu, K. Tirumala Rao & P. Srinivas Department Of Electronics & Comm. Engineering, Nimra College of Engineering

More information

Communication Amid Uncertainty

Communication Amid Uncertainty Communication Amid Uncertainty Madhu Sudan Harvard University Based on joint works with Brendan Juba, Oded Goldreich, Adam Kalai, Sanjeev Khanna, Elad Haramaty, Jacob Leshno, Clement Canonne, Venkatesan

More information

DSTWU A Shortcut Distillation Model in Aspen Plus V8.0

DSTWU A Shortcut Distillation Model in Aspen Plus V8.0 DSTWU A Shortcut Distillation Model in Aspen Plus V8.0 1. Lesson Objectives Learn how to use DSTWU to start distillation column design. Learn the strengths and limitations of shortcut methods 2. Prerequisites

More information

PROGRAMMING LINX LEARNING GAME

PROGRAMMING LINX LEARNING GAME PROGRAMMING LINX LEARNING GAME Linx Overview Linxis a game based on removing colored balls from a moving path by creating chains of three or more of the same color. Players control a firing mechanism (in

More information

Lab 4: Root Locus Based Control Design

Lab 4: Root Locus Based Control Design Lab 4: Root Locus Based Control Design References: Franklin, Powell and Emami-Naeini. Feedback Control of Dynamic Systems, 3 rd ed. Addison-Wesley, Massachusetts: 1994. Ogata, Katsuhiko. Modern Control

More information

A CO 2 Waveform Simulator For Evaluation and Testing of Respiratory Gas Analyzers

A CO 2 Waveform Simulator For Evaluation and Testing of Respiratory Gas Analyzers 2011 ROCKY MOUNTAIN NASA SPACE GRANT CONSORTIUM 1 A CO 2 Waveform Simulator For Evaluation and Testing of Respiratory Gas Analyzers Christina Long, and Joseph Orr, Ph.D. Department of Bioengineering, University

More information

Surfing Interconnect

Surfing Interconnect Surfing Interconnect Mark R. Greenstreet and Jihong Ren University of British Columbia, Rambus Surfing Interconnect p.1/17 Motivation Wires are the problem: Wires scale poorly with feature size: Gate delays

More information

Oxygen Meter User Manual

Oxygen Meter User Manual Oxygen Meter User Manual Monday, July 23, 2007 1. Outline...2 2. Program...3 2.1. Environment for program execution...3 2.2. Installation...3 2.3. Un installation...3 2.4. USB driver installation...3 2.5.

More information

Chapter 20. Planning Accelerated Life Tests. William Q. Meeker and Luis A. Escobar Iowa State University and Louisiana State University

Chapter 20. Planning Accelerated Life Tests. William Q. Meeker and Luis A. Escobar Iowa State University and Louisiana State University Chapter 20 Planning Accelerated Life Tests William Q. Meeker and Luis A. Escobar Iowa State University and Louisiana State University Copyright 1998-2008 W. Q. Meeker and L. A. Escobar. Based on the authors

More information

Reliability of Safety-Critical Systems Chapter 4. Testing and Maintenance

Reliability of Safety-Critical Systems Chapter 4. Testing and Maintenance Reliability of Safety-Critical Systems Chapter 4. Testing and Maintenance Mary Ann Lundteigen and Marvin Rausand mary.a.lundteigen@ntnu.no RAMS Group Department of Production and Quality Engineering NTNU

More information

A Game Theoretic Study of Attack and Defense in Cyber-Physical Systems

A Game Theoretic Study of Attack and Defense in Cyber-Physical Systems The First International Workshop on Cyber-Physical Networking Systems A Game Theoretic Study of Attack and Defense in Cyber-Physical Systems ChrisY.T.Ma Advanced Digital Sciences Center Illinois at Singapore

More information

The Game of Yinsh (Phase II)

The Game of Yinsh (Phase II) The Game of Yinsh (Phase II) COL333 October 27, 2018 1 Goal The goal of this assignment is to learn the adversarial search algorithms (minimax and alpha beta pruning), which arise in sequential deterministic

More information

215 Liquid Handler Up-Grade Manual

215 Liquid Handler Up-Grade Manual BRUKER NMR 220 25 Liquid Handler Up-Grade Manual For Up-Grade to Run with XWINNMR Vers.. Manual # H977 The kit will include: H9770 BEST NMR Up-Grade Kit to No. Article Bruker # Comment 500mm Capillary

More information

TSP at isolated intersections: Some advances under simulation environment

TSP at isolated intersections: Some advances under simulation environment TSP at isolated intersections: Some advances under simulation environment Zhengyao Yu Vikash V. Gayah Eleni Christofa TESC 2018 December 5, 2018 Overview Motivation Problem introduction Assumptions Formation

More information

REPORT, RE0813, MIL, ENV, 810G, TEMP, IN HOUSE, , PASS

REPORT, RE0813, MIL, ENV, 810G, TEMP, IN HOUSE, , PASS REPORT, RE0813, MIL, ENV, 810G, TEMP, IN HOUSE, TST 00191 REV. A Crystal Group Inc 850 Kacena Rd., Hiawatha, IA Phone: 877 279 7863 Fax: 319 393 2338 9/23/2014 Revision History REV Date Approved Description

More information

A study on the relation between safety analysis process and system engineering process of train control system

A study on the relation between safety analysis process and system engineering process of train control system A study on the relation between safety analysis process and system engineering process of train control system Abstract - In this paper, the relationship between system engineering lifecycle and safety

More information

SHUFFLE TURN OF HUMANOID ROBOT SIMULATION BASED ON EMG MEASUREMENT

SHUFFLE TURN OF HUMANOID ROBOT SIMULATION BASED ON EMG MEASUREMENT SHUFFLE TURN OF HUMANOID ROBOT SIMULATION BASED ON EMG MEASUREMENT MASANAO KOEDA, TAKAYUKI SERIZAWA, AND YUTA MATSUI Osaka Electro-Communication University, Faculty of Information Science and Arts, Department

More information

Safety Critical Systems

Safety Critical Systems Safety Critical Systems Mostly from: Douglass, Doing Hard Time, developing Real-Time Systems with UML, Objects, Frameworks And Patterns, Addison-Wesley. ISBN 0-201-49837-5 1 Definitions channel a set of

More information

Rescue Rover. Robotics Unit Lesson 1. Overview

Rescue Rover. Robotics Unit Lesson 1. Overview Robotics Unit Lesson 1 Overview In this challenge students will be presented with a real world rescue scenario. The students will need to design and build a prototype of an autonomous vehicle to drive

More information

Module 3 Developing Timing Plans for Efficient Intersection Operations During Moderate Traffic Volume Conditions

Module 3 Developing Timing Plans for Efficient Intersection Operations During Moderate Traffic Volume Conditions Module 3 Developing Timing Plans for Efficient Intersection Operations During Moderate Traffic Volume Conditions CONTENTS (MODULE 3) Introduction...1 Purpose...1 Goals and Learning Outcomes...1 Organization

More information

Communication Amid Uncertainty

Communication Amid Uncertainty Communication Amid Uncertainty Madhu Sudan Harvard University Based on joint works with Brendan Juba, Oded Goldreich, Adam Kalai, Sanjeev Khanna, Elad Haramaty, Jacob Leshno, Clement Canonne, Venkatesan

More information

Simulation analysis of the influence of breathing on the performance in breaststroke

Simulation analysis of the influence of breathing on the performance in breaststroke Available online at www.sciencedirect.com Procedia Engineering 34 (2012 ) 736 741 9 th Conference of the International Sports Engineering Association (ISEA) Simulation analysis of the influence of breathing

More information

PLM & Lake Handbook. Table of Contents. Lake System Overview 3. Firmware & Presets 5. Groups & Overlays 20. File Management 30

PLM & Lake Handbook. Table of Contents. Lake System Overview 3. Firmware & Presets 5. Groups & Overlays 20. File Management 30 PLM & Lake Handbook Table of Contents Lake System Overview 3 1.1 Lake Terminology 3 1.2 PLM signal path 4 Firmware & Presets 5 2.1 Updating Amplifier Firmware 5 2.2 Loading Frame Presets 7 2.3 Recalling

More information

A Semi-Automated Functional Test Data Analysis Tool

A Semi-Automated Functional Test Data Analysis Tool A Semi-Automated Functional Test Data Analysis Tool Peng Xu, Philip Haves, Moosung Kim Lawrence Berkeley National Lab Synopsis The growing interest in commissioning is creating a demand that will increasingly

More information

CPE/EE 427, CPE 527 VLSI Design I L21: Sequential Circuits. Review: The Regenerative Property

CPE/EE 427, CPE 527 VLSI Design I L21: Sequential Circuits. Review: The Regenerative Property CPE/EE 427, CPE 527 VLSI esign I L21: Sequential Circuits epartment of Electrical and Computer Engineering University of Alabama in Huntsville Aleksandar Milenkovic ( www.ece.uah.edu/~milenka ) www.ece.uah.edu/~milenka/cpe527-5f

More information

AN-140. Protege WX SALLIS Integration Application Note

AN-140. Protege WX SALLIS Integration Application Note AN-140 Protege WX SALLIS Integration Application Note The specifications and descriptions of products and services contained in this document were correct at the time of printing. Integrated Control Technology

More information

a quick quiz on cricket & crypto 7 questions in 7 minutes Craig Costello 2014 ECC Rump Session Chennai, India

a quick quiz on cricket & crypto 7 questions in 7 minutes Craig Costello 2014 ECC Rump Session Chennai, India a quick quiz on cricket & crypto 7 questions in 7 minutes Craig Costello 2014 ECC Rump Session Chennai, India Question 1 The favourite to win next year s cricket world cup is: Question 1 The favourite

More information

International Journal of Engineering Trends and Technology (IJETT) Volume 18 Number2- Dec 2014

International Journal of Engineering Trends and Technology (IJETT) Volume 18 Number2- Dec 2014 Compression and Decompression of FPGA Bit Stream Using Bitmask Technique K.Khuresh Gouse 1 N.Chitra 2 K.Maheshwari 3 1 PG Student (M.Tech), 2 Associate Professor, 3 Associate Professor, Dept. of ECE, Gates

More information

VLSI Design I; A. Milenkovic 1

VLSI Design I; A. Milenkovic 1 Review: The Regenerative Property V i V o V i V o CPE/EE 47, CPE 57 VLSI esign I : Sequential Circuits epartment of Electrical and Computer Engineering University of labama in Huntsville leksandar Milenkovic

More information

Arithmetic Coding Modification to Compress SMS

Arithmetic Coding Modification to Compress SMS G8-5 2011 International Conference on Electrical Engineering and Informatics 17-19 July 2011, Bandung, Indonesia Arithmetic Coding Modification to Compress SMS Ario Yudo Husodo #1, Rinaldi Munir *2 #*

More information

beestanbul RoboCup 3D Simulation League Team Description Paper 2012

beestanbul RoboCup 3D Simulation League Team Description Paper 2012 beestanbul RoboCup 3D Simulation League Team Description Paper 2012 Baris Demirdelen, Berkay Toku, Onuralp Ulusoy, Tuna Sonmez, Kubra Ayvaz, Elif Senyurek, and Sanem Sariel-Talay Artificial Intelligence

More information

Available online at ScienceDirect. Transportation Research Procedia 2 (2014 )

Available online at   ScienceDirect. Transportation Research Procedia 2 (2014 ) Available online at www.sciencedirect.com ScienceDirect Transportation Research Procedia 2 (2014 ) 264 272 The Conference on in Pedestrian and Evacuation Dynamics 2014 (PED2014) Exhaustive analysis with

More information

iloq H10S3, H10S4 AND H10S5 PADLOCK

iloq H10S3, H10S4 AND H10S5 PADLOCK 1 iloq H10S3, H10S4 AND H10S5 PADLOCK General The patented, award winning iloq S10 locking system offers advanced security and convenient access management for master-key locking environments. The iloq

More information

Development of Fish type Robot based on the Analysis of Swimming Motion of Bluefin Tuna Comparison between Tuna-type Fin and Rectangular Fin -

Development of Fish type Robot based on the Analysis of Swimming Motion of Bluefin Tuna Comparison between Tuna-type Fin and Rectangular Fin - Development of Fish type Robot based on the Analysis of Swimming Motion of Bluefin Tuna Comparison between Tuna-type Fin and Rectangular Fin - Katsuya KUGAI* Abstract The swimming motion of Tuna type fishes

More information

Racecar Rear Wing Setup Optimization via 2D CFD Simulations

Racecar Rear Wing Setup Optimization via 2D CFD Simulations Racecar Rear Wing Setup Optimization via 2D CFD Simulations Simulating Systems Ground Transportation Motorsport Graduate Engineer Test & Development Lotus Cars STAR Global Conference 2014 Vienna Austria

More information

Cloud, Distributed, Embedded. Erlang in the Heterogeneous Computing World. Omer

Cloud, Distributed, Embedded. Erlang in the Heterogeneous Computing World. Omer Cloud, Distributed, Embedded. Erlang in the Heterogeneous Computing World Omer Kilic @OmerK omer@erlang-solutions.com Outline Challenges in modern computing systems Heterogeneous computing Co-processors

More information

Reconfigurable Computing Lab 01: Traffic Light Controller

Reconfigurable Computing Lab 01: Traffic Light Controller Informatik 12 Cauerstr. 11 91058 Erlangen Reconfigurable Computing Lab 01: Traffic Light Controller In this lab, a traffic light controller (see Exercise 1) will be implemented on the Digilent Spartan-3

More information

ELE 455/555 Computer System Engineering. Section 2 The Processor Class 4 Pipelining with Hazards

ELE 455/555 Computer System Engineering. Section 2 The Processor Class 4 Pipelining with Hazards ELE 455/555 Computer System Engineering Section 2 The Processor Class 4 Pipelining with Hazards Overview Simple Datapath 2 tj Overview Pipeline Control 3 tj Data Hazards Data Hazards sub $2,$1,$3 $2 =?

More information

ATM 322 Basic Pneumatics H.W.6 Modules 5 7

ATM 322 Basic Pneumatics H.W.6 Modules 5 7 ATM 322 Basic Pneumatics H.W.6 Modules 5 7 Name: Answer Key Mark: Question I: Write (T) for True and (F) for false sentences. A) For the time dependant process control; Step enabling conditions are generated

More information

JOLLY2. Installation user s manual. 6 different operating modes selectable. version 3.3. DATA TO BE FILLED OUT BY THE INSTALLER (Page 1)

JOLLY2. Installation user s manual. 6 different operating modes selectable. version 3.3. DATA TO BE FILLED OUT BY THE INSTALLER (Page 1) ENGLISH ENGLISH ENGLISH ENGLISH Installation user s manual Warning! electrical scheme modified JANUARY 2005 version 3.3 JOLLY2 DATA TO BE FILLED OUT BY THE INSTALLER (Page 1) 6 different operating modes

More information

Knowledge. Improvement. Success. SAM PuttLab. 3D putt replay module

Knowledge. Improvement. Success.  SAM PuttLab. 3D putt replay module Knowledge. Improvement. Success. www.scienceandmotion.com SAM PuttLab 3D putt replay module The COMPLETE putting solution Putt training in a new dimension 43% of the golf shots are putts, however, putting

More information

Polynomial DC decompositions

Polynomial DC decompositions Polynomial DC decompositions Georgina Hall Princeton, ORFE Joint work with Amir Ali Ahmadi Princeton, ORFE 7/31/16 DIMACS Distance geometry workshop 1 Difference of convex (dc) programming Problems of

More information

Team Description: Building Teams Using Roles, Responsibilities, and Strategies

Team Description: Building Teams Using Roles, Responsibilities, and Strategies Team Description: Building Teams Using Roles, Responsibilities, and Strategies Simon Ch'ng and Lin Padgham (schng cs. trait, edu. au) (linpa cs. rrait, edu. au) Department of Computer Science Royal Melbourne

More information

TTL Flash Interface connections

TTL Flash Interface connections TTL Flash Interface connections Nikon TTL Hot-shoe Interface Gnd = Ground, Earth, Mass, Common. X = X (trigger) contact. Q = Quench or TTL stop. Rdy = Ready to fire SP = Speedlight present (Monitor). The

More information

CONDUITS DST-Tel Aviv-Yafo Case Study

CONDUITS DST-Tel Aviv-Yafo Case Study CONDUITS DST-Tel Aviv-Yafo Case Study Introduction The city of Tel Aviv-Yafo is the nucleus of the Tel Aviv metropolitan area and serves as the financial and cultural centre of Israel. With a population

More information

HIGH RESOLUTION DEPTH IMAGE RECOVERY ALGORITHM USING GRAYSCALE IMAGE.

HIGH RESOLUTION DEPTH IMAGE RECOVERY ALGORITHM USING GRAYSCALE IMAGE. HIGH RESOLUTION DEPTH IMAGE RECOVERY ALGORITHM USING GRAYSCALE IMAGE Kazunori Uruma 1, Katsumi Konishi 2, Tomohiro Takahashi 1 and Toshihiro Furukawa 1 1 Graduate School of Engineering, Tokyo University

More information

Neural Network in Computer Vision for RoboCup Middle Size League

Neural Network in Computer Vision for RoboCup Middle Size League Journal of Software Engineering and Applications, 2016, *,** Neural Network in Computer Vision for RoboCup Middle Size League Paulo Rogério de Almeida Ribeiro 1, Gil Lopes 1, Fernando Ribeiro 1 1 Department

More information

Out-of-Core Cholesky Factorization Algorithm on GPU and the Intel MIC Co-processors

Out-of-Core Cholesky Factorization Algorithm on GPU and the Intel MIC Co-processors Out-of-Core Cholesky Factorization Algorithm on GPU and the Intel MIC Co-processors Ben Chan (Chinese University of Hong Kong) Nina Qian (Chinese University of Hong Kong) Mentors: Ed D Azevedo (ORNL) Shiquan

More information

An approach for optimising railway traffic flow on high speed lines with differing signalling systems

An approach for optimising railway traffic flow on high speed lines with differing signalling systems Computers in Railways XIII 27 An approach for optimising railway traffic flow on high speed lines with differing signalling systems N. Zhao, C. Roberts & S. Hillmansen Birmingham Centre for Railway Research

More information

BWS is a Bitcoin-based community-centric crypto currency with a focus on

BWS is a Bitcoin-based community-centric crypto currency with a focus on BWS Team Page 1 BWS is a Bitcoin-based community-centric crypto currency with a focus on decentralization, privacy, and real-world use. It utilizes an energy efficient Proof of Stake protocol and a second-tier

More information

RoboCup Soccer Simulation League 3D Competition Rules and Setup for the 2011 competition in Istanbul

RoboCup Soccer Simulation League 3D Competition Rules and Setup for the 2011 competition in Istanbul RoboCup Soccer Simulation League 3D Competition Rules and Setup for the 2011 competition in Istanbul V. 1.0 June 2011 Table of Contents 1. Introduction...2 2. Tournament Format...3 3. Schedule...4 4. Hardware

More information

Profile-driven Selective Code Compression

Profile-driven Selective Code Compression Profile-driven Selective Code Compression Yuan Xie and Wayne Wolf Electrical Engineering Department Princeton University Princeton, NJ 08540, USA yuanxie,wolf@ee.princeton.edu Haris Lekatsas NEC USA 4

More information

How a championshipwinning. cut engineering cycles by 30% Advanced project management software speeds performance improvements to the track.

How a championshipwinning. cut engineering cycles by 30% Advanced project management software speeds performance improvements to the track. TEAM PENSKE How a championshipwinning race team cut engineering cycles by 30% Advanced project management software speeds performance improvements to the track. CHALLENGE SOLUTION RESULTS View Overview

More information

XC2 Client/Server Installation & Configuration

XC2 Client/Server Installation & Configuration XC2 Client/Server Installation & Configuration File downloads Server Installation Backup Configuration Services Client Installation Backup Recovery Troubleshooting Aug 12 2014 XC2 Software, LLC Page 1

More information

Education and Research

Education and Research Richard Wall University of Idaho http://www.ece.uidaho.edu/ee/digital/rwall/research/transportation/niatt.html edu/ee/digital/rwall/research/transportation/niatt html 1 Presentations Summary of activities

More information

BUYER S GUIDE AQUAlogger 530WTD

BUYER S GUIDE AQUAlogger 530WTD OCEAN & ENVIRONMENTAL BUYER S GUIDE AQUAlogger 530WTD Wireless Temperature and Depth Logger AQUAlogger 530WTD The AQUAlogger 530WTD has an innovative design that includes the ability to transfer stored

More information

Cardiac Output Simulation for Specific Makes of Monitor. Each injection yields in a time-temperature curve whose area represents the cardiac output:

Cardiac Output Simulation for Specific Makes of Monitor. Each injection yields in a time-temperature curve whose area represents the cardiac output: Cardiac Output Simulation for Specific Makes of Monitor Theory The measurement of the volume of blood pumped by the heart is a valuable diagnostic tool in the management of patients undergoing major cardiovascular

More information

Designing Mechanisms for Reliable Internet-based Computing

Designing Mechanisms for Reliable Internet-based Computing Designing Mechanisms for Reliable Internet-based Computing Chryssis Georgiou University of Cyprus, Cyprus Antonio Fernandez Miguel Mosteiro Universidad Rey Juan Carlos, Spain Trustworthy Network Computing

More information