Sciweavers

CHES
2010
Springer
172views Cryptology» more  CHES 2010»
13 years 6 months ago
Analysis and Improvement of the Random Delay Countermeasure of CHES 2009
Random delays are often inserted in embedded software to protect against side-channel and fault attacks. At CHES 2009 a new method for generation of random delays was described tha...
Jean-Sébastien Coron, Ilya Kizhvatov
ARC
2008
Springer
99views Hardware» more  ARC 2008»
13 years 7 months ago
Accelerating Speculative Execution in High-Level Synthesis with Cancel Tokens
We present an improved method for scheduling speculative data paths which relies on cancel tokens to undo computations in misspeculated paths. Performancewise, this method is consi...
Hagen Gädke, Andreas Koch
ICPR
2006
IEEE
14 years 6 months ago
Bottom-Up Hierarchical Image Segmentation Using Region Competition and the Mumford-Shah Functional
This paper generalizes the methods in a previous paper [10] in two ways. First, a more comprehensive analysis of the initialization problem of the Chan-Vese models is given. Secon...
J. Douglas Birdwell, Seddik M. Djouadi, Yongsheng ...