179
Voted
BIRTHDAY
13 years 11 months ago
2012 Springer
Embedded systems must interact with their real-time environment in a timely and dependable fashion. Most embeddedsystems architectures and design processes consider “nonfunction...
149
Voted
BIRTHDAY
13 years 11 months ago
2012 Springer
We introduce the use of asynchronous logic automata (ALA) for cryptography. ALA aligns the descriptions of hardware and software for portability, programmability, and scalability. ...
161
Voted
BIRTHDAY
13 years 11 months ago
2012 Springer
Finding efficient countermeasures for cryptosystems against fault attacks is challenged by a constant discovery of flaws in designs. Even elements, such as public keys, that do no...
141
Voted
BIRTHDAY
13 years 11 months ago
2012 Springer
This paper describes a new accumulate-and-add multiplication algorithm. The method partitions one of the operands and re-combines the results of computations done with each of the ...
144
Voted
BIRTHDAY
13 years 11 months ago
2012 Springer
3-D integration presents many new opportunities for architects and embedded systems designers. However, 3-D integration has not yet been explored by the cryptographic hardware com...
|