Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Kun-Lin Tsai is active.

Publication


Featured researches published by Kun-Lin Tsai.


ieee international newcas conference | 2010

Design of low latency on-chip communication based on hybrid NoC architecture

Kun-Lin Tsai; Feipei Lai; Chien-Yu Pan; Di-Sheng Xiao; Hsiang-Jen Tan; Hung-Chang Lee

Bus and mesh based Networks-on-Chip (NoC) are two different architectures of on-chip communication. Each of them has different features and applications. In this paper, we combine these two architectures and construct a hybrid one. In the hybrid architecture, the IP cores with heavy communication affinity are placed in the same subsystem, and a large mesh NoC is partitioned into several subsystems and individual IPs, so that the transmission latency of NoC can be reduced. An efficient partition and mapping algorithm is proposed for the hybrid NoC architecture. Experimental result shows that an average latency improvement of 17.6% can be obtained when compared with the conventional mesh NoC architecture.


IEEE Transactions on Circuits and Systems | 2013

Low Leakage TCAM for IP Lookup Using Two-Side Self-Gating

Yen-Jen Chang; Kun-Lin Tsai; Hsiang-Jen Tsai

Ternary content-addressable memory (TCAM) is a popular hardware device for fast routing lookup and an attractive solution for applications such as packet forwarding and classification. However, the high cost and power consumption are limiting its popularity and versatility. In this paper, a low leakage power TCAM architecture which uses two-side self power gating technique is proposed to reduce the leakage power dissipation of the mask SRAM cells. The TCAM mask cells are divided into several segments, and the mask bits of one segment are the same except for the boundary segment. In this design, the boundary segment is activated and the others are disabled so that the leakage power can be reduced. The experimental results show that average 26% leakage power can be reduced by using UMC 90 nm CMOS process with 1.0 V supply voltage when compared with the traditional TCAM architecture.


international symposium on circuits and systems | 2011

A priority based output arbiter for NoC router

Cheng-Hao Chan; Kun-Lin Tsai; Feipei Lai; Shun-Hung Tsai

Network-on-Chip (NoC) is an on-chip communication method with good scalability and reliability. One of the most important issues of NoC design is low transmission latency design. In this paper, we propose a priority based output arbitration method to eliminate the congestion state of the NoC. By detecting and dispatching the packet requirements from different directions, the packets have different priorities. According to the priorities, the packets can pass the congested router in order. Simulation results demonstrate that the proposed method can reduce the transmission latency about 20% in uniformly distributed traffic and about 30% in hot-spot traffic when compare with the conventional router. In the router design, the new arbiter area overhead is less than 1%.


ieee international conference on fuzzy systems | 2009

LMI-based fuzzy control for a class of time-delay discrete fuzzy bilinear system

Shun-Hung Tsai; Ming-Ying Hsiao; Kun-Lin Tsai

This paper presents robust fuzzy controllers for a class of T-S time-delay discrete fuzzy bilinear systems (DFBSs) with disturbance which ensures the robust asymptotic stability of the closed-loop system and guarantees an H∞ norm bound constraint on disturbance attenuation. Firstly, we proposed a H∞ fuzzy controller to stabilize the T-S DFBS with disturbance. Secondly, based on the Schur complement and some variable transformation, the stability conditions of the overall fuzzy control system are formulated by linear matrix inequalities (LMIs). Finally, the validity and applicability of the proposed schemes are demonstrated by simulations.


IEEE Access | 2016

TTP Based High-Efficient Multi-Key Exchange Protocol

Kun-Lin Tsai; Yi-Li Huang; Fang-Yie Leu; Ilsun You

With a trusted-third-party (TTP)-based key exchange protocol, when a user would like to transmit a message to another user, the transmitted data are encrypted by a session key exchanged between the two ends of the corresponding connection with the help of the TTP. Up to present, due to the assistance of a TTP, this type of protocols has performed well in protecting messages delivered between two authorized users. Even this, inflexibility, unreliability, and inefficiency problems still exist in these previously proposed protocols. Therefore, in this paper, a multi-key exchange protocol, named the TTP-based high-efficient multi-key exchange protocol (THMEP), is proposed to provide users with a secure and efficient protocol, which employs the elliptic curve cryptography, a 2-D operation, and a current time encryption key, to exchange their session keys. The proposed protocol not only effectively hides important encryption parameters, but also achieves fully mutual authentication between a user and his/her trusted server. It can resist known-key, impersonation, replay, eavesdropping, and forgery attacks. Besides, the THMEP generates 40 session keys in a key exchange process, meaning the proposed protocol can support 40 sessions simultaneously. It also shortens the processing time, which is 3.78 times faster than that of a specific previous study. Its security level and performance are higher than those of the compared state-of-the-art protocols. In other words, the THMEP is very suitable for IoT applications.


Intelligent Automation and Soft Computing | 2016

Data Encryption Method Using Environmental Secret Key with Server Assistance

Kun-Lin Tsai; Fang-Yie Leu; Shun-Hung Tsai

AbstractData encryption is an effective method for enterprises and government offices to protect their important information from being lost or leaked, especially when data is transmitted on the Internet. In this paper, we propose a novel data encryption/decryption method, named the Data Encryption Method using Environmental Secret Key with Server Assistance (DESK for short), which provides users with an environmental key of a trusted computer and a group key created for an authorized group to encrypt their data. In the DESK, the important parameters are separately stored and hidden in server and the trusted computer to avoid them from being cracked easily. The proposed method not only protects the important data from being loss, but is also able to resist replay attack and eavesdropping attack. The DESK has a very high security level, which is practically useful in homeland security.


International Journal of Computer Mathematics | 2016

An ECC-based secure EMR transmission system with data leakage prevention scheme

Kun-Lin Tsai; Fang-Yie Leu; Jiu Soon Tan

In this paper, we propose a secure electronic medical record (EMR) service system, named the ECC-based Secure EMR Transmission System (ESEMRT for short) which employs a cloud database, an elliptic curve cryptography (ECC) integration unit, a smart card, and portable devices to provide users with a secure environment for EMR transmission. The ECC integration unit, which integrates a 256-bit ECC chip, wireless transceiver, smart card reader, and USB interface for fast computing and reducing the communication load of a portable device, can securely protect the EMRs when these EMRs are delivered between the cloud database and the portable device so as to enhance their transmission security and the patient care quality. Besides, the data leakage prevention scheme is also implemented in the ESEMRT to avoid illegal duplication. Our simulation shows that the proposed system can provide a higher security level and reduce portable devices’ hardware resource requirements.


international conference on electronics, circuits, and systems | 2008

A low power high performance design for JPEG Huffman decoder

Kun-Lin Tsai; Paul Lan; Shanq-Jang Ruan; Mou-Chau Shie

JPEG image codec is one of the most commonly used standards for communication and storage applications. In this paper, we propose a simple and successful design for a JPEG alternating current Huffman decoder with low power and high performance considerations. Based on the parallel Huffman decoder structure, we utilize the bipartition architecture on the lookup table to reduce power consumption without sacrificing decoding performance. Gate level power simulation results show a maximum of 25% power reduction can be obtained when compared with the conventional JPEG parallel Huffman decoder.


innovative mobile and internet services in ubiquitous computing | 2014

High-Efficient Multi-key Exchange Protocol Based on Three-Party Authentication

Kun-Lin Tsai; Yi–Li Huang; Fang Yie Leu; Jiu Soon Tan; Mengyuan Ye

Three-party authenticated key exchange protocol is designed for securing the communication between two users with the help of a trusted server. The users can encrypt data with the exchanged secret keys and then transmit the cipher text to each other. However, the inefficiency, unreliability, and inflexibility problems that can be found in many previous studies should be solved. Therefore, in this paper, we propose a secure multiple key exchange scheme, named the High-efficient Multi-key Exchange protocol based on Three-party Authentication (HeM3A for short), which provides users with a secure method to exchange their encryption keys by utilizing the elliptic curve cryptographic method, the logical XOR operation and the binary addition. The propose is hiding important parameters so as to avoid them from being cracked by hackers easily, and resist known-key, impersonation, replay and eavesdropping attacks. The multi-key exchange process, which provides higher security and performance than previous protocols, is practically useful in securing mobile applications.


IEEE Transactions on Circuits and Systems | 2014

Automatic Charge Balancing Content Addressable Memory With Self-control Mechanism

Kun-Lin Tsai; Yen-Jen Chang; Yu-Cheng Cheng

Content addressable memory (CAM) is widely used in many applications, especially for those applications needing fast memory access. However, due to the parallel comparison feature and the frequent precharge/discharge of match-lines, the power consumption of CAM is considerable. In this paper, a fast and automatic charge balancing CAM architecture is proposed to control the voltage swing of match-lines so that the huge power consumption of CAM can be reduced. In the proposed design, the complementary property of the N-type CAM and the P-type CAM is used to balance the charge of match-lines. Especially, no specific sense amplifier is needed to detect the match status of match-lines. For a translation lookaside buffer example with 128 memory entries, the experimental result shows that 25.98% dynamic power and 3.30% leakage power can be reduced by using TSMC 90 nm CMOS process with 1.2 V supply voltage and only 2.23% circuit area is increased when compared with the traditional design.

Collaboration


Dive into the Kun-Lin Tsai's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Feipei Lai

National Taiwan University

View shared research outputs
Top Co-Authors

Avatar

Shanq-Jang Ruan

National Taiwan University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Shun-Hung Tsai

National Taipei University of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ilsun You

Soonchunhyang University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge