Sciweavers

872 search results - page 82 / 175
» A Leakage-Resilient Mode of Operation
Sort
View
IROS
2006
IEEE
163views Robotics» more  IROS 2006»
15 years 7 months ago
Robotic On-Orbit Servicing - DLR's Experience and Perspective
The increasing number of launched satellites per year, calls for solutions to keep free operational space for telecommunication systems in geo-synchronized orbit, as well as to av...
Klaus Landzettel, Carsten Preusche, Alin Albu-Sch&...
CHES
2007
Springer
327views Cryptology» more  CHES 2007»
15 years 7 months ago
On the Power of Bitslice Implementation on Intel Core2 Processor
Abstract. This paper discusses the state-of-the-art fast software implementation of block ciphers on Intel’s new microprocessor Core2, particularly concentrating on “bitslice i...
Mitsuru Matsui, Junko Nakajima
PLDI
2003
ACM
15 years 6 months ago
Compile-time dynamic voltage scaling settings: opportunities and limits
With power-related concerns becoming dominant aspects of hardware and software design, significant research effort has been devoted towards system power minimization. Among run-t...
Fen Xie, Margaret Martonosi, Sharad Malik
CASES
2004
ACM
15 years 5 months ago
Reducing energy consumption of queries in memory-resident database systems
The tremendous growth of system memories has increased the capacities and capabilities of memory-resident embedded databases, yet current embedded databases need to be tuned in or...
Jayaprakash Pisharath, Alok N. Choudhary, Mahmut T...
CHES
2006
Springer
131views Cryptology» more  CHES 2006»
15 years 5 months ago
Why One Should Also Secure RSA Public Key Elements
It is well known that a malicious adversary can try to retrieve secret information by inducing a fault during cryptographic operations. Following the work of Seifert on fault induc...
Eric Brier, Benoît Chevallier-Mames, Mathieu...