Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jian-Hong Chen is active.

Publication


Featured researches published by Jian-Hong Chen.


Microprocessors and Microsystems | 2007

Reconfigurable system for high-speed and diversified AES using FPGA

Ming-Haw Jing; Zih-Heng Chen; Jian-Hong Chen; Yan-Haw Chen

In this article, we present a FPGA-based reconfigurable system for the advanced encryption standard (AES) algorithm. This proposed design, called diversified AES (DAES), has the variations of four parameters: the field irreducible polynomial, the affine transformation in the SubBytes, the offsets in the ShiftRows, and the polynomial in the MixColumns. The advantage of such variations in the AES system is that they increase the strength regarding internal or external attacks. We also use straightforward architecture - look-up tables - for encryption and decryption to lead this system simple and high-speed using field programmable gate arrays (FPGAs).


IEEE Communications Letters | 2010

Unusual general error locator polynomial for the (23, 12, 7) golay code

Chong-Dao Lee; Yaotsu Chang; Ho-Hsuan Chang; Jian-Hong Chen

For algebraic decoding of the (23, 12, 7) Golay code, this letter proposes a new error locator polynomial, called the unusual general error locator polynomial, whose coefficients are expressed as a sum of powers of their previous ones. Because of this special property, the determination of such a polynomial can be terminated earlier, and the number of errors occurred can be recognized at the same time.


international conference on signal processing | 2007

Diversified Mixcolumn transformation of AES

Ming-Haw Jing; Jian-Hong Chen; Zih-Heng Chen

In the Rijndael, one can replace some variations to produce different ciphers, including the irreducible polynomial, the affine transformation in the SubByte, the offsets in the ShiftRow, and the polynomial in the MixColumn, to increase the variety of the Advanced Encryption Standard (AES) algorithm. In this article we present three types of MixColumn polynomials that can be easily provided diversified selections of the AES algorithm.


IEEE Communications Letters | 2010

Decoding Binary Cyclic Codes with Irreducible Generator Polynomials up to Actual Minimum Distance

Chong-Dao Lee; Yaotsu Chang; Ming-Haw Jing; Jian-Hong Chen

This letter presents two modified algorithms to decode up to actual minimum distance for binary cyclic codes with irreducible generator polynomials. The key ideas behind these decoding algorithms are the utilization of the extended Euclids algorithm for univariate polynomials to evaluate the unknown syndromes and the coefficients of general error locator polynomial, which has not been developed before. The advantage of these algorithms is particularly suitable for software and hardware implementations.


international symposium on circuits and systems | 2006

New viewpoint of bit-serial/parallel normal basis multipliers using irreducible all-one polynomial

Zih-Heng Chen; Ming-Haw Jing; Jian-Hong Chen; Yaotsu Chang

Recently, normal bases have been an appealing technique for hardware implementation in many applications, especially when finite fields are very large, such as the public key cryptosystems. In this article, a new viewpoint is introduced for performing the multiplication in the normal basis representation over binary field where the field defining irreducible polynomial is an all-one polynomial. The proposed multipliers carry out the normal basis multiplication by using extended polynomial basis multiplier to construct two architectures. These two classes of architectures are in bit-serial and bit-parallel which reduce the cost of space and time respectively


asia pacific conference on circuits and systems | 2006

Low Complexity Architecture for Multiplicative Inversion in GF(2m)

Ming-Haw Jing; Jian-Hong Chen; Zih-Heng Chen; Yan-Haw Chen

The multiplicative inversion in finite field is much more complex than all field arithmetic operations. In this paper, a design of a simpler inversion module with lower complexity in GF(2m) using standard basis is proposed. It has the major improvement comparing with the design proposed by Wang et al. and Dinh et al. The implementations of those algorithms are examined in detail using 0.18-mum CMOS technology. The proposed method results in reduction of area requirement by 28% to 48% when m is between 3 and 12


embedded and ubiquitous computing | 2007

The secure DAES design for embedded system application

Ming-Haw Jing; Jian-Hong Chen; Zih-Heng Chen; Yaotsu Chang

Recently, Advanced Encryption Standard (AES) has become one of the major symmetric encryption algorithms used in the embedded system applications. Many researches extended use of the algorithm of AES for system security. In this paper, we propose a diversified AES (DAES) to create more variations. In the architecture of the DAES, the diversity results from the modification of the parameters of DAES. In the process of system design, the additional parameters may not only cause operational complexity but also influence the security. In this article, a method to measure the security of DAES is also provided. We propose a strategy to optimize the design of the DAES with higher security from the scope of S-box via repeating property and MixColumn polynomials via branch number. During the analysis procedure, the size of embedded program may also be reduced.


IEEE Communications Letters | 2010

A Result on Zetterberg Codes

Ming-Haw Jing; Yaotsu Chang; Chong-Dao Lee; Jian-Hong Chen; Zih-Heng Chen

The family of Zetterberg codes with parameters (2u+1, 2u+1-2u) for even u is one of the best known double error correcting codes because of their large code rate and high decoding speed. In this letter, we prove that when u is odd, Zetterberg codes can correct all errors of weight at most two with only 2u+1 exceptions. Moreover, by multiplying (x-1) to the generator polynomials of Zetterberg codes with u odd, the cyclic codes generated are two-error correctable. A decoding algorithm is developed for the new family of Zetterberg codes.


international conference on information and communication security | 2009

High-speed low-complexity Golay decoder based on syndrome-weight determination

Ming-Haw Jing; Yih-Ching Su; Jian-Hong Chen; Zih-Heng Chen; Yaotsu Chang

In this paper, a very high-throughput and area efficient hardware decoder of the binary (23, 12, 7) Golay code is presented. The key feature of this proposed algorithm is fast determination of the error positions through the analysis on the weight of syndromes without large operations of finite fields. Comparing with the algorithm using one syndrome, the proposed algorithm is more suitable for the parallel hardware design by using two syndromes. For some common FPGA technology the complete system occupies only 666 logic elements and the time delay is 25.9 ns; for a 0.18-μm CMOS technology the result is a 0.026 mm2 area and a 2.58 Gbps throughput.


asia pacific conference on circuits and systems | 2008

Design of simple and high speed VLSI core for the protection of mass storages

Ming-Haw Jing; Zih-Heng Chen; Jian-Hong Chen; Cheng-Yi Wu

This paper presents a research to strengthen the using of embedded system memory, including: Flash memory, SRAM, DRAM etc. For increasing the reliability on data storage, we use the conventional fault-tolerant mechanisms-Mirror and CRC techniques to carry out the forward protection at first. Furthermore we use the encryption and Reed-Solomon code to improve the function at back end. This article designs a simple and high speed solution based on the finite field arithmetic, let the fault-tolerant facility can tolerate one-bit error from multiple bit error or multiple column error on common memories. Then we advanced improve the speed problem of Reed-Solomon code in coding, and develop an efficient way in the VLSI architecture. Finally we adopt the embedded system of DE2 to develop the co-design coding environment to provide a complete and high reliability scheme.

Collaboration


Dive into the Jian-Hong Chen's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Yan-Haw Chen

Fortune Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge