Design and Analysis of 16 Bit Reversible ALU
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2012, Vol 1, Issue 1
Abstract
Reversible or information-lossless circuits have applications in digital signal processing, communication, computer graphics and cryptography. Reversibility plays an important role when energy efficient computations are considered. Reversible logic is used to reduce the power dissipation that occurs in classical circuits by preventing the loss of information. This paper proposes a reversible design of a 16 bit ALU. This ALU consists of eight operations, three arithmetic and five logical operations. The arithmetic operations include addition, subtraction, multiplication and the logical operations include NAND, AND, OR, NOT and XOR. All the modules are being designed using the basic reversible gates. The power and delay analysis of the various sub modules is performed and a comparison with the traditional circuits is also carried out
Cryptanalysis of Efficient Unlinkable Secret Handshakes forAnonymous Communications
Abstract: Several unlinkable secret handshakes schemes have been proposed in recent years. As performingthe successful secret handshakes is essentially equivalent to computing a common key between two interactiveme...
Evolution of Cloud Storage as Cloud Computing Infrastructure Service
Enterprises are driving towards less cost, more availability, agility, managed risk - all of which is accelerated towards Cloud Computing. Cloud is not a particular product, but a way of delivering IT services that are...
A Survey on Energy Efficiency and Cluster Handling in Real Time Wireless Sensor Networks
Abstract: Wireless networking technology in recent years has seen a thriving development. Wireless sensor networks (WSN) has remote environmental monitoring and target tracking as an important application. This makes sen...
Video Steganography: A Survey
Abstract: Recent advances in information technology have made quick delivery and sharing of multimedia information possible. But these advances in technology are leading breaches to information security and personal info...
Celllls breaks tthe Tor’’s Anonymiitty:: Oniion Routter
To hide the communication of users, the anonymity systems pack the application data into equal – sized cells. The size of IP packets in the Tor network can be very dynamic and the IP layer may be repack cells....