{"updated":"2025-01-23T03:03:54.416216+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00010069","sets":["581:599:610"]},"path":["610"],"owner":"1","recid":"10069","title":["完全自立形スケーラブルIP コアの設計法と楕円曲線暗号処理システムへの適用"],"pubdate":{"attribute_name":"公開日","attribute_value":"2007-02-15"},"_buckets":{"deposit":"9742f2a2-28ba-4419-9c2d-e3bdf2ff9398"},"_deposit":{"id":"10069","pid":{"type":"depid","value":"10069","revision_id":0},"owners":[1],"status":"published","created_by":1},"item_title":"完全自立形スケーラブルIP コアの設計法と楕円曲線暗号処理システムへの適用","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"完全自立形スケーラブルIP コアの設計法と楕円曲線暗号処理システムへの適用"},{"subitem_title":"A Design Method of Self-supporting Scalable IP Core and Application to Elliptic Curve Cryptosystem Design","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"論文","subitem_subject_scheme":"Other"}]},"item_type_id":"2","publish_date":"2007-02-15","item_2_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"東京電機大学情報環境学部情報環境工学科 現在,株式会社日立超LSI システムズ"},{"subitem_text_value":"国際短期大学情報ネットワーク学科"},{"subitem_text_value":"東京電機大学情報環境学部情報環境工学科"},{"subitem_text_value":"東京電機大学情報環境学部情報環境工学科"},{"subitem_text_value":"東京電機大学情報環境学部情報環境工学科"},{"subitem_text_value":"東京電機大学工学部電気工学科"}]},"item_2_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Department of Information Environment Engineering School of Information Environment, Tokyo Denki University,Presently with Hitachi ULSI Systems","subitem_text_language":"en"},{"subitem_text_value":"Department of Information and Network, Kokusai Junior College","subitem_text_language":"en"},{"subitem_text_value":"Department of Information Environment Engineering School of Information Environment, Tokyo Denki University","subitem_text_language":"en"},{"subitem_text_value":"Department of Information Environment Engineering School of Information Environment, Tokyo Denki University","subitem_text_language":"en"},{"subitem_text_value":"Department of Information Environment Engineering School of Information Environment, Tokyo Denki University","subitem_text_language":"en"},{"subitem_text_value":"Department of Electrical Engineering School of Engineering, Tokyo Denki University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/10069/files/IPSJ-JNL4802044.pdf"},"date":[{"dateType":"Available","dateValue":"2009-02-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-JNL4802044.pdf","filesize":[{"value":"462.4 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"8"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"b7004681-95ee-4771-b0e6-60e09a489c7e","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2007 by the Information Processing Society of Japan"}]},"item_2_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"佐藤, 正幸"},{"creatorName":"中村, 次男"},{"creatorName":"畠中, 浩行"},{"creatorName":"冬爪成人"},{"creatorName":"笠原, 宏"},{"creatorName":"田中, 照夫"}],"nameIdentifiers":[{}]}]},"item_2_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Masayuki, Sato","creatorNameLang":"en"},{"creatorName":"Tsugio, Nakamura","creatorNameLang":"en"},{"creatorName":"Hiroyuki, Hatakenaka","creatorNameLang":"en"},{"creatorName":"Narito, Fuyutsume","creatorNameLang":"en"},{"creatorName":"Hiroshi, Kasahara","creatorNameLang":"en"},{"creatorName":"Teruo, Tanaka","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_2_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN00116647","subitem_source_identifier_type":"NCID"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_6501","resourcetype":"journal article"}]},"item_2_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"1882-7764","subitem_source_identifier_type":"ISSN"}]},"item_2_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"次世代集積回路の規模は数十から数百のIP コアからなると予測されており,IP コアの流通が不可欠となる.しかし,製造元の異なる多種多様なIP コアの仕様を理解して集積化および各IP コアを使用することは非常に困難である.また,ますます高精度化する処理データに対し,柔軟に対応しようとして,単にスケーラブルなアーキテクチャを用意しても,回路やソフトウェアの変更をともなうのでそのIP コアの詳細な仕様を理解することが不可欠となる.そのため,次世代の高集積回路においては多種多様なIP コア間インタフェースの標準化,再利用性,使用容易性および拡張性などが求められる.そこで,処理に必要なデータをIP コアに与えるとデータの長さに合った処理をIP コア内で判断し,結果を返すという,処理精度に対してスケーラブルなアーキテクチャを持ったIP コアの設計法を提案する.設計過程におけるスケーラビリティではなく,設計成果物としてのIP コアそのものがスケーラブルであり,外部からの制御をまったく必要とせず,かつ処理データの長さに制限されない,まさに完全自立形IP コアの実現である.これにより,以上に述べた諸問題がいかに解決できるかを,多くの多項式からなりモジュール化が困難であった楕円曲線暗号アクセラレータに,可変長鍵に対応可能なIP コアとして適用できることを示し,提案する設計法の有効性を検証している.","subitem_description_type":"Other"}]},"item_2_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"The next generation large scale IC is expected to be the collection of various IP cores, where, standardization of interface between each core, reusability, ease of use, and scalability, are unavoidable. In this paper, we propose a design method of IP core which has the architecture of scalability on arithmetic processing. For the input with any digit number into the core, it scales the least necessary procedure and returns the results with maximum efficiency of time and power expenditure. The scalability in this paper, does not means that in design procedure, but means a feature of design product (IP core), without external control circuit, and limitlessly adaptable to any digit numbers. We call the feature as completely self-supportable. As the proof of feasibility of the method, we show the result applied for designing an elliptic curve cryptosystem which is adaptable to any key-length.","subitem_description_type":"Other"}]},"item_2_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"879","bibliographic_titles":[{"bibliographic_title":"情報処理学会論文誌"}],"bibliographicPageStart":"868","bibliographicIssueDates":{"bibliographicIssueDate":"2007-02-15","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"2","bibliographicVolumeNumber":"48"}]},"relation_version_is_last":true,"item_2_alternative_title_2":{"attribute_name":"その他タイトル","attribute_value_mlt":[{"subitem_alternative_title":"組み込みシステム"}]},"weko_creator_id":"1"},"created":"2025-01-18T22:45:06.786495+00:00","id":10069,"links":{}}