Multiplicative inverse in GF (2 m ) is a complex step in some important application such as Elliptic Curve Cryptography (ECC) and other applications. It operates by multiplying and squaring operation depending on the number of bits (m) in the field GF (2 m ). In this paper, a fast method is suggested to find inversion in GF (2 m ) using FPGA by reducing the number of multiplication operations in the Fermat's Theorem and transferring the squaring into a fast method to find exponentiation to (2 k ). In the proposed algorithm, the multiplicative inverse in GF(2 m ) is achieved by number of multiplications depending on log 2 (m) and each exponentiation is operates in a single clock cycle by generating a reduction matrix for high power of two exponentiation. The number of multiplications is in range between (log 2 (m) and 2log 2 (m)-2). If m equals 163 then the number of multiplication operations is 9 and number of exponentiation operation each one with one clock cycle equals 10.
This research deals with the foreign policy and the Russian trends towards Iraqafter the year 2000 AD, the international variables that affect that bilateralrelationship and the importance of the position and weight of Iraq in the MiddleEast and the attempt to include Iraq in the international organizations and blocsled by China and the Russian Federation such as the Shanghai CooperationOrganization, and joining the Chinese Belt and Road project to serve interests TheIraqi economy, and an attempt to extend its influence through security alliances inthe region in general, and Iraq in particular, as the quadrilateral center of the waron terrorism in which Russia, Iran, Iraq and Syria participated, which strengthensbilateral relations between
... Show MorePraise be to God, who started his book with the praise of himself and prayers and peace be upon those who have no prophet after him and his family and companions and those who followed them with charity until the Day of Judgment.
For it is known to every researcher in jurisprudence and its origins that the semantics in terms of formulas for assignment are divided into an order and a prohibition, and I have seen it necessary to write a small research on the prohibition, and since this topic is complex, and has a great impact on the difference of scholars, I decided to write on one issue of it And it is the absolute prohibition and its effect on the difference of jurists, and what is meant by the absolute p
Warm dark matter (WDM) models offer an attractive alternative to the current cold dark matter (CDM) cosmological model. We present a novel method to differentiate between WDM and CDM cosmologies, namely, using weak lensing; this provides a unique probe as it is sensitive to all of the “matter in the beam,” not just dark matter haloes and the galaxies that reside in them, but also the diffuse material between haloes. We compare the weak lensing maps of CDM clusters to those in a WDM model corresponding to a thermally produced 0.5 keV dark matter particle. Our analysis clearly shows that the weak lensing magnification, convergence, and shear distributions can be used to distinguish
The study of the future of the international system currently appears, according to scientific data and existing facts in light of the emergence of international actors from non-states and international informal institutions, to be heading towards a non-polarity system and this trend is fueled by many variables to reduce polarity, and it is expected in the future that the international system will turn into a non-polarity.
Research summary
Perhaps the methods of mask that Arab poets resorted to in our time are due to the conditions of oppression and political and social repression that the Arab poet suffered from; So he strived to circumvent it, and it became a justification for hiding behind it. The research is available on a number of topics that lead to the definition of the mask technique and the beginning of its prevalence in Arabic literature after the Second World War, especially in recent decades by benefiting from historical stories, fairy tales and legends of all kinds. As well as defining the mask idiomatically and linguistically, and the beginning of its use in ancient religious rituals, and the special place it had in Greek plays. Poets
... Show Moreهذه الدراسة مكرسة للخصائص الوظيفية والدلالية المعقدة للفئات اللفظية من التوتر والنوع في اللغة الروسية سيتم الكشف في هذه الدراسة عن السمات الدلالية والأسلوبية للفرق بين الأفعال المكتملة وغير المكتملة، قد تكون الاختلافات مرتبطة بخصائص المعاني المعجمية للكلمات، وكذلك معاني اللواحق المكونة للكلمات) السوابق واللواحق). يعكس استخدام هذه الفئة النحوية في أنماط مختلفة بوضوح تفاصيل كل منها، لأن درجة واقعية ال
... Show MoreDeep submicron technologies continue to develop according to Moore’s law allowing hundreds of processing elements and memory modules to be integrated on a single chip forming multi/many-processor systems-on-chip (MPSoCs). Network on chip (NoC) arose as an interconnection for this large number of processing modules. However, the aggressive scaling of transistors makes NoC more vulnerable to both permanent and transient faults. Permanent faults persistently affect the circuit functionality from the time of their occurrence. The router represents the heart of the NoC. Thus, this research focuses on tolerating permanent faults in the router’s input buffer component, particularly the virtual channel state fields. These fields track packets f
... Show MoreThe present study aims to identify the socio-psychological implications that police investigators experience regarding the variable of gender, age, place of residence, qualification, military rank, and work experience. The study included 6 individuals who were working in investigation department in Hebron district as a sample. The results demonstrated that the targeted sample had a dump attitude toward the socio-psychological implications. The psychological implications reflected 2.8739, the social side represents 3.2956.