Sciweavers

BIRTHDAY
2012
Springer
13 years 8 months ago
The Logical Execution Time Paradigm
Embedded systems must interact with their real-time environment in a timely and dependable fashion. Most embeddedsystems architectures and design processes consider “nonfunction...
Christoph M. Kirsch, Ana Sokolova
121
Voted
BIRTHDAY
2012
Springer
13 years 8 months ago
Cryptography with Asynchronous Logic Automata
We introduce the use of asynchronous logic automata (ALA) for cryptography. ALA aligns the descriptions of hardware and software for portability, programmability, and scalability. ...
Peter Schmidt-Nielsen, Kailiang Chen, Jonathan Bac...
BIRTHDAY
2012
Springer
13 years 8 months ago
Secret Key Leakage from Public Key Perturbation of DLP-Based Cryptosystems
Finding efficient countermeasures for cryptosystems against fault attacks is challenged by a constant discovery of flaws in designs. Even elements, such as public keys, that do no...
Alexandre Berzati, Cécile Canovas-Dumas, Lo...
112
Voted
BIRTHDAY
2012
Springer
13 years 8 months ago
Operand Folding Hardware Multipliers
This paper describes a new accumulate-and-add multiplication algorithm. The method partitions one of the operands and re-combines the results of computations done with each of the ...
Byungchun Chung, Sandra Marcello, Amir-Pasha Mirba...
117
Voted
BIRTHDAY
2012
Springer
13 years 8 months ago
A Qualitative Security Analysis of a New Class of 3-D Integrated Crypto Co-processors
3-D integration presents many new opportunities for architects and embedded systems designers. However, 3-D integration has not yet been explored by the cryptographic hardware com...
Jonathan Valamehr, Ted Huffmire, Cynthia E. Irvine...
Applied Computing
Top of PageReset Settings