Sciweavers

140
Voted
CANS
2006
Springer
129views Cryptology» more  CANS 2006»
15 years 7 months ago
Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields
Pairings on elliptic curves have been used as cryptographic primitives for the development of new applications such as identity based schemes. For the practical applications, it is...
Tae-Hyun Kim, Tsuyoshi Takagi, Dong-Guk Han, Ho Wo...
108
Voted
DATE
2004
IEEE
119views Hardware» more  DATE 2004»
15 years 7 months ago
Configuration-Sensitive Process Scheduling for FPGA-Based Computing Platforms
Reconfigurable computing has become an important part of research in software systems and computer architecture. While prior research on reconfigurable computing have addressed ar...
Guilin Chen, Mahmut T. Kandemir, Ugur Sezer
126
Voted
DATE
2004
IEEE
135views Hardware» more  DATE 2004»
15 years 7 months ago
Quasi-Static Scheduling for Real-Time Systems with Hard and Soft Tasks
This report addresses the problem of scheduling for real-time systems that include both hard and soft tasks. In order to capture the relative importance of soft tasks and how the ...
Luis Alejandro Cortés, Petru Eles, Zebo Pen...
120
Voted
DATE
2004
IEEE
139views Hardware» more  DATE 2004»
15 years 7 months ago
From Synchronous to Asynchronous: An Automatic Approach
This paper presents a methodology to derive asynchronous circuits from optimized synchronous circuits by replacing the clock distribution tree by a handshaking network. A case stu...
Jordi Cortadella, Alex Kondratyev, Luciano Lavagno...
67
Voted
DATE
2004
IEEE
116views Hardware» more  DATE 2004»
15 years 7 months ago
OCCN: A Network-On-Chip Modeling and Simulation Framework
Marcello Coppola, Stephane Curaba, Miltos D. Gramm...