Here are some technical papers I have written for various conferences. I have asked for permission to publish them on my homepage. If you have a problem with that, please let me know.

Using Divide-And-Conquer on Custom Lengthed Fourier Transforms

Fourier Transforms (FTs) are the key to all modern, OFDM-based (Orthogonal Frequency Division Multiplexing) transmission schemes. This paper demonstrates the principles and the efficient implementation of arbitrary length FTs, using divide and conquer techniques for decomposition into "atomic" transforms. Using "Digital Radio Mondiale" as an example, we will present generalized FT processing hardware, its complexity, processing time, precision and design re-use.

Conference: ICCE 2006, January 7-11, 2006, Las Vegas, NV, USA
Available at: "ICCE 2006 Digest of Technical Papers- International Conference on Consumer Electronics", ISBN 0-7803-9459-3, pp. 333-334

Protecting the copyright of an embedded device with cryptography

Embedded devices are small computers with a CPU, memory (for example SRAM), a mass-storage unit (an external Flash-ROM) and input-/output capabilities. With enough knowledge about the CPU, an attacker can deassemble the software, and learn all about the implemented algorithms, thus accessing and disclosing intellectual property of the developing company. He could modify the content, and resale the product under his own label. Or he could sell verbatim copies of the device, resulting in lost revenues and potential liability issues. Therefore some sort of protection method should be applied, e.g. encryption of the Flash content. This way, software updates can be given to customers on a regular basis, without giving too much secrecy away.

Conference: Electronica 2006, November 14-17, 2006, Munich, Germany
Available at: Nowhere

Using Cryptography as Copyright Protection for Embedded Devices

Copyright protection should not be limited to content alone. Software, running on an embedded device and stored in its flash-ROM, is also in danger of being copied or rebranded, resulting in lost revenues and liability issues. Cryptography is a way to prevent this, while being invisible to the customers.

Conference: ICCE 2007, January 10-14, 2007, Las Vegas, NV, USA
Available at: "ICCE 2007 Digest of Technical Papers- International Conference on Consumer Electronics", ISBN 1-4244-0762-1, pp. 299-300