156
click to vote
BIRTHDAY
13 years 8 months ago
2012 Springer
Embedded systems must interact with their real-time environment in a timely and dependable fashion. Most embeddedsystems architectures and design processes consider “nonfunction...
121
Voted
BIRTHDAY
13 years 8 months ago
2012 Springer
We introduce the use of asynchronous logic automata (ALA) for cryptography. ALA aligns the descriptions of hardware and software for portability, programmability, and scalability. ...
134
click to vote
BIRTHDAY
13 years 8 months ago
2012 Springer
Finding efficient countermeasures for cryptosystems against fault attacks is challenged by a constant discovery of flaws in designs. Even elements, such as public keys, that do no...
112
Voted
BIRTHDAY
13 years 8 months ago
2012 Springer
This paper describes a new accumulate-and-add multiplication algorithm. The method partitions one of the operands and re-combines the results of computations done with each of the ...
117
Voted
BIRTHDAY
13 years 8 months ago
2012 Springer
3-D integration presents many new opportunities for architects and embedded systems designers. However, 3-D integration has not yet been explored by the cryptographic hardware com...
|