摘要:
An actinic ray-sensitive or radiation-sensitive resin composition containing a resin having (A) a repeating unit represented by a specific formula (I) and (B) a repeating unit capable of generating an acid upon irradiation with an actinic ray or radiation.
摘要:
An embodiment of the composition contains a resin (P) containing a repeating unit (A) that is configured to decompose when exposed to actinic rays or radiation to thereby generate an acid. The repeating unit (A) contains a cation structure with a monocyclic or polycyclic heterocycle containing a nitrogen atom.
摘要:
An active light ray sensitive or radioactive ray sensitive resin composition which satisfies high sensitivity, high resolution, good pattern configuration, and good line edge roughness at the same time to a great extent, while having sufficiently good outgassing performance during exposure, and an active light ray sensitive or radioactive ray sensitive film formed by using the composition, and a pattern-forming method, are provided.The active light ray sensitive or radioactive ray sensitive resin composition according to the present invention includes a resin (P) containing a repeating unit (A) which decomposes by irradiation with active light ray or radioactive ray to generate an acid, and a repeating unit (C) containing a primary or secondary hydroxyl group.
摘要:
According to one embodiment, an actinic-ray- or radiation-sensitive resin composition includes a compound that when exposed to actinic rays or radiation, generates any of acids of general formula (I) below, in which W1 represents an optionally substituted alkylene group, W2 represents a bivalent connecting group, W3 represents an optionally substituted organic group having 15 or more carbon atoms, and Z represents a hydroxyl group or a fluoroalkylsulfonamido group having at least one fluorine atom introduced therein as a substituent.
摘要:
According to an embodiment, a memory management device increments a lower value of a first counter, updates the counter by incrementing an upper value and resetting the lower value when the lower value overflows, increments to update the lower counter value when the upper value is incremented as a result of writing a second data piece having the upper value in common to a memory, recalculates a first secret value calculated using the first counter values and a root secret value in response to the first counter update, writes a first data piece and the first secret value to the memory, and at reading of the first data piece and the first secret value, calculates a second secret value using the updated first counter values and the root secret value, and compares the first secret value with the second secret value to verify the first data piece.
摘要:
According to an embodiment, a computer program product includes a computer-readable medium including program, when executed by a computer, to have a plurality of modules run by the computer. The computer includes a memory having a shared area, which is an area accessible to only those modules which run cooperatively and storing therein execution module identifiers. Each of the modules includes a first operation configured to store, just prior to a switchover of operations to an other module that runs cooperatively, an identifier of the other module as the execution module identifier in the shared area; and a second operation configured to execute, when the execution module identifier stored in the shared area matches with an identifier of own module immediately after a switchover of operations from the other module, a function inside the own module.
摘要:
According to an embodiment, a first linear transformation unit performs a linear transformation from mask data to first mask data. A second linear transformation unit performs a linear transformation from mask data to second mask data. A first calculator calculates first data based upon data to be processed and the first mask data. A selecting unit selects the first data or the second mask data. A non-linear transformation unit performs a non-linear transformation on the selected first data or second mask data. A second calculator calculates second data based upon the first data after the non-linear transformation and the mask data. A third linear transformation unit performs a linear transformation on the second data. The second data after the linear transformation by the third linear transformation unit is retained as new data to be processed, and the second mask data after the non-linear transformation is retained as new mask data.
摘要:
According to one embodiment, in a key scheduling device, a non-linear transformation unit non-linearly transforms at least one of partial keys resulting from dividing an expanded key. A first linear transformation unit includes first and second circuits. The second circuit linearly transforms the partial key by directly using a transformation result from the non-linear transformation unit. A first storage stores the partial key linearly transformed by the first linear transformation unit. A second linear transformation unit linearly transforms, inversely to the first linear transformation unit, each of partial keys other than the partial key linearly transformed by the second circuit out of the partial keys stored in the first storage, and outputs inversely transformed partial keys. A second storage stores one of inputs to the second circuit. An outputting unit connects the respective inversely transformed partial keys and the input stored in the second storage to be output as a second key.
摘要:
According to one embodiment, an encryption device includes a storage unit, an input unit, first to fourth partial encryption units, a generation unit, and an output unit. The first partial encryption unit calculates first intermediate data from input plain data to store in the storage unit. The generation unit generates a round key, which is used in calculations for the first intermediate data and N-th intermediate data, from the secret key. The second partial encryption unit calculates (i+1)th intermediate data from i-th intermediate data (i is smaller than N) and the round key to store in the storage unit. The third partial encryption unit performs an arithmetic operation including predetermined conversion for mixing the N-th intermediate data, and calculates (N+1)th intermediate data to store in the storage unit. The fourth partial encryption unit obtains encrypted data by performing an arithmetic operation including inverse conversion of the conversion on the (N+1)th intermediate data.