Sciweavers

ITC
2000
IEEE
62views Hardware» more  ITC 2000»
15 years 7 months ago
Power conscious test synthesis and scheduling for BIST RTL data paths
Nicola Nicolici, Bashir M. Al-Hashimi
ITC
2000
IEEE
84views Hardware» more  ITC 2000»
15 years 7 months ago
Non-intrusive BIST for systems-on-a-chip
1 The term "functional BIST" describes a test method to control functional modules so that they generate a deterministic test set, which targets structural faults within ...
Silvia Chiusano, Paolo Prinetto, Hans-Joachim Wund...
ISW
2000
Springer
15 years 7 months ago
Weighted One-Way Hash Chain and Its Applications
An one-way hash chain generated by the iterative use of a one-way hash function on a secret value has recently been widely employed to develop many practical cryptographic solution...
Sung-Ming Yen, Yuliang Zheng
ISW
2000
Springer
15 years 7 months ago
Classification of Authentication Protocols: A Practical Approach
We propose a simple classification method for public-key based authentication protocols, which consists of identifying several basic properties leading to a large number of generic...
DongGook Park, Colin Boyd, Ed Dawson