IEICE ESS Fundamentals Review
Online ISSN : 1882-0875
ISSN-L : 1882-0875
Volume 6, Issue 1
Displaying 1-28 of 28 articles from this issue
Cover
Table of Contents
Preface
Special Contribution
Special Contribution
Review Papers
Proposed by IT
Proposed by ISEC
  • Isamu TERANISHI
    2012 Volume 6 Issue 1 Pages 26-36
    Published: July 01, 2012
    Released on J-STAGE: July 01, 2012
    JOURNAL FREE ACCESS
    Key Dependent Message (KDM) security for an encryption scheme is based on the notion that ciphertexts can ensure the secrecy of the corresponding plaintexts even if the plaintexts depend on a secret key. Although KDM security was previously considered a nonstandard security concept, recent research has clarified its significance in both theoretical and practical areas. In this survey, we review the definition and applications of KDM security. We then review recent for KDM security.
    Download PDF (1519K)
Proposed by VLD
  • - Another Alternative General-Purpose Program-Executing Mechanism to the CPU -
    Kazutoshi WAKABAYASHI
    2012 Volume 6 Issue 1 Pages 37-50
    Published: July 01, 2012
    Released on J-STAGE: July 01, 2012
    JOURNAL FREE ACCESS
    This paper discusses High-Level Synthesis (HLS), which reads C or C++ behavioral descriptions and generates a register-transfer level description for ASIC or FPGA. First, the LSI design process and the history of LSI design automation are introduced, and the reason why design processes were automated with the increasing size of LSI is discussed. Next, the fundamental processes in HLS are explained. The advantages of HLS are higher design efficiency, performance, reliability, and reusability. This paper illustrates how and why HLS provides such advantages. This paper also discusses the performance of FSMD, which is the target architecture of HLS and consists of a finite-state machine and a datapath in contrast to a CPU. It has taken many years to create a practical commercial HLS tool since its prototype. This is because a practical HLS tool requires a variety of optimizing techniques. This paper introduces some of the important techniques. Then, the application of HLS to not only data-dominant circuits but also control-intensive circuits is explained. Then, the difference between the C description for hardware and software is illustrated. Finally, recent HLS techniques for FPGAs and the new application area “FPGAs and C-based HLS” are explained.
    Download PDF (2165K)
Proposed by SIP
  • - The Last 25 Years and Future -
    Akihiko SUGIYAMA
    2012 Volume 6 Issue 1 Pages 51-60
    Published: July 01, 2012
    Released on J-STAGE: July 01, 2012
    JOURNAL FREE ACCESS
    This paper presents an overview of the MPEG audio standardization process as footsteps of the development of audio coding technologies in the last 25 years, with some technologies that the author has devoted a significant part of his career to as a research engineer. First, the development of audio coding technologies is overviewed by following the history of MPEG/Audio standardization. The MPEG-2/-4 AAC encoding process is then explained, which is now recognized as the standard framework for audio-data compression,followed by some technologies that the author has been deeply involved in as a research engineer. Finally, MPEG/Audio Standards are summarized from the viewpoint of redundancy reduction, and an outlook for the future is presented.
    Download PDF (11671K)
Miscellaneous Articles
ESS News
International Conference Report
Let's go to IEICE Workshops!
Winners' Voice
Connecticut Report
Call for Papers
Committees & Editors Notes
feedback
Top