National Repository of Grey Literature 54 records found  1 - 10nextend  jump to record: Search took 0.00 seconds. 
VHDL-based implementation of CRYSTALS-Kyber components on FPGA
Jedlicka, Petr ; Hajny, Jan
CRYSTALS-Kyber is one of the finalists of the National Institute of Standards and Technology (NIST) post-quantum cryptography competition. In this paper, we deal with effective hardware-accelerated implementations of components intended for the use in the FPGA (Field Programmable Gate Array) implementation of the above-mentioned lattice-based cryptography scheme. The discussed components are NTT (Number Theoretic Transform), inverse NTT (NTT−1), CBD (Centered Binomial Distribution) and the Parse Algorithm (shortly Parse). The improved implementation of NTT (NTT−1) requires 1189 (1568) Look-Up Tables (LUTs), 1469 (2161) Flip-Flops (FFs), 28 (50) Digital Signal Processing blocks (DSPs) and 1.5 (1.5) Block Memories (BRAMs). The latency of the design is 322 (334) clock cycles at the frequency 637 MHz which makes the presented NTT (NTT−1) implementations to be currently the fastest ones. The implementations of the sampling functions (CBD and Parse) requires less than 100 LUTs and FFs with maximum latency 5 clock cycles at the frequencies over 700 Mhz. All implementations has been synthesized for the Xilinx Virtex UltraScale+ architecture.
Web application demonstrating lattice-based cryptography
Sečkár, Martin ; Jedlička, Petr (referee) ; Ricci, Sara (advisor)
Zámer tejto práce je vyvinúť a implementovať webovú aplikáciu demonštrujúcu kryptografiu založenú na mriežkach. Aplikácia bola vyvinutá použitím programovacieho jazyku Python a kontajnerizačnej platformy Docker. Špecifickejšie, implementované moduly používajú knižnicu Bokeh a vlastnú JavaScript funkcionalitu, ktorá rozširuje danú knižnicu Bokeh. Tieto moduly sú poskytované serverom Flask, kde taktiež prebiehajú všetky výpočty pomocou knižnice numPy. Aplikácia obsahuje tri moduly popisujúce problém najbližšieho vektora, problém učenia s chybami a Boyenov kryptografický protokol založený na predchádzajúcom probléme. Užívatelia majú možnosť vizualizovať dvojdimenzionálne mriežky a prevádzať vybrané výpočty. Zdrojový kód je jednoducho rozšíriteľný a môže slúžiť ako náučná platforma. Práca taktiež obsahuje inštalačný a používateľský manuál.
Verification of Function Blocks for FPGA
Kříž, Daniel ; Smékal, David (referee) ; Jedlička, Petr (advisor)
This master thesis is devoted to the issue of verification of function blocks for FPGA. The teoritical part of thesis describes the concept of verification, verification methodologies that provide the necessary tools for testing the design, and finally discusses the issue of Ethernet and its differences from the low-latency variant. The aim of the practical part of the master thesis is based on the acquired theoretical knowledge and selected verification methodology to build a verification environment, perform a thorough verification of the low-latency physical layer of Ethernet and finally measure the latency and throughput of this circuit.
Postquantum Cryptography on the FPGA Platform
Dobiáš, Patrik ; Jedlička, Petr (referee) ; Malina, Lukáš (advisor)
This master thesis deals with the hardware implementations of post-quantum cryptogra- phy schemes on FPGA platforms. After the initial comparison of the candidate schemes for NIST standardization and the analysis of the previous work focusing on these schemes, Crystals-KYBER scheme was chosen and implemented. All scheme algorithms have been implemented inside a single component, minimizing resource utilization. The results of this implementation were analyzed and compared with the existing implementations. At the end of this work, the implemented scheme was deployed on Virtext UltraScale+ and tested for the use during mutually authenticated key exchange (AKE).
Postquantum cryptography on FPGA
Győri, Adam ; Jedlička, Petr (referee) ; Smékal, David (advisor)
This work describes the post-quantum algorithm FrodoKEM, its hardware implementation in VHDL and software simulation of implementation, subsequent implementation of the implementation on the FPGA process system. The work describes the issue of postquantum cryptography and VHDL programming language used to describe the functionality of hardware. Furthermore, the work deals with the functional implementation and simulation of all parts of the algorithm. Specifically, these are parts, key generation, encapsulation, and decapsulation. Algorithm implementation and simulations were performed in the Vivado software simulation environment, created by Xilinx. Subsequently, the synthesis and implementation was performed and the Intellectual property block was designed, the key part of which covered the functionality of the NEXYS A7 FPGA board was not available. The last part of the work deals with the workflow algorithm for implementation on FPGA board NEXYS A7.
Cryptographic algorithms on FPGA
Broda, Jan ; Jedlička, Petr (referee) ; Hajný, Jan (advisor)
The master thesis is focused on developing a demonstrator which is able to transmit data not only between operating system and network FPGA card with a UltraScale+ chip but also between two network FPGA cards. The theoretical part of the master thesis describes FPGA, developing on FPGA, programming languges that are used and develoment enviroment Vivado Design Suite. The demonstrator consists of two applications developed in C language which are used for communication between operating system and the network FPGA card and two components developed in VHDL langague which are used for communication throught a network module on the network FPGA card. The demonstrator allows inserting cryptographic algorithm which would work with transmitted data. For developing on the network FPGA card was used a Network Development Kit provided by a Liberouter team from CESNET association.
Solvency Internal models
Mertl, Jakub ; Cipra, Tomáš (advisor) ; Mazurová, Lucie (referee) ; Jedlička, Petr (referee)
Title: Solvency Internal models Author: Mgr. Ing. Jakub Mertl Abstract: The subject of thesis is assessment of calculation methods on capital adequacy of currently implemented regulation in insurance industry called Solvency II. The aim of the thesis is to build up a partial internal model fulfilling the condition of Solvency II. The thesis deals with the premium and reserve risks that are essential part of non-life business. Different approaches of risk assessment are described and aggregation of those risks as well. An important part of the thesis is a numerical example illustrating presented methods.
Statistical Properties of the Estimate of Non-Life Insurance Technical Reserves
Pechanec, Jan ; Jedlička, Petr (advisor) ; Cipra, Tomáš (referee)
In the presented work we study two different statistical methods for estimating IBNR reserve that is a part of the reserve for outstanding claims reserves. The first method is stochastic version of the Chain ladder method and the second one is a PTF model. We describe theories of the methods and show their different properties. The Chain ladder method does not assume any distribution of claims amount, on the other hand PTF models assume normal distribution of logarithms of incremental data. In practical part of this work we apply both methods on illustrative data and then we compare the results. We inspect especially probabilistic distribution of estimate of reserves and their statistical characteristics. An important part of this work is statistical testing of assumptions of both methods.
The (Social) Construction of Scientific Fact
Jedlička, Petr ; Balon, Jan (advisor) ; Kandert, Josef (referee)
The thesis draws from the examples of the knowledge of two time periods - the Middle Ages and the Early Modern Era - to discuss the claims of the constructivist school of the sociology of knowledge. The first part provides a detailed account of the views of the key constructivist figures Ludwik Fleck, David Bloor, and the anthropologist of knowledge Yehuda Elkana. The following chapter examines the main characteristics and dynamics of the medieval religious discourse with the use of Elkana's concept of images of knowledge. The next chapter provides an account of the key period of Early Modern science and shows the rise of the empirical and rational paradigm and the introduction of scientific methods, as well as the broader social context of this process. The changes in the hierarchy of knowledge are primarily demonstrated with the examples of the English natural philosophers and society during the Age of Restoration. Special attention is devoted to sources of knowledge and the methods of their legitimization and verification during both periods, in addition to an examination, based on the Strong program, of the societal roots and factors determining or influencing that knowledge. Are the tenets of the Bloor's thesis, which put forward the idea of a strong social component of knowledge, valid? Is...

National Repository of Grey Literature : 54 records found   1 - 10nextend  jump to record:
See also: similar author names
22 Jedlicka, Petr
1 Jedlička, P.
5 Jedlička, Pavel
Interested in being notified about new results for this query?
Subscribe to the RSS feed.