Sciweavers

38 search results - page 8 / 8
» Using Tweaks to Design Fault Resistant Ciphers
Sort
View
SACRYPT
2007
Springer
141views Cryptology» more  SACRYPT 2007»
13 years 11 months ago
Analysis of Countermeasures Against Access Driven Cache Attacks on AES
Cache attacks on implementations of cryptographic algorithms have turned out to be very powerful. Progress in processor design, e.g., like hyperthreading, requires to adapt models ...
Johannes Blömer, Volker Krummel
ISCA
2009
IEEE
239views Hardware» more  ISCA 2009»
13 years 11 months ago
Scalable high performance main memory system using phase-change memory technology
The memory subsystem accounts for a significant cost and power budget of a computer system. Current DRAM-based main memory systems are starting to hit the power and cost limit. A...
Moinuddin K. Qureshi, Vijayalakshmi Srinivasan, Ju...
ESA
2003
Springer
99views Algorithms» more  ESA 2003»
13 years 10 months ago
Adversary Immune Leader Election in ad hoc Radio Networks
Abstract. Recently, efficient leader election algorithms for ad hoc radio networks with low time complexity and energy cost have been designed even for the no-collision detection,...
Miroslaw Kutylowski, Wojciech Rutkowski