Sciweavers

804 search results - page 104 / 161
» Algorithms for Programmers
Sort
View
RECONFIG
2009
IEEE
118views VLSI» more  RECONFIG 2009»
15 years 9 months ago
Protecting the NOEKEON Cipher against SCARE Attacks in FPGAs by Using Dynamic Implementations
Abstract. Protecting an implementation against Side Channel Analysis for Reverse Engineering (SCARE) attacks is a great challenge and we address this challenge by presenting a fir...
Julien Bringer, Hervé Chabanne, Jean-Luc Da...
SEKE
2009
Springer
15 years 9 months ago
Detecting Defects with an Interactive Code Review Tool Based on Visualisation and Machine Learning
Code review is often suggested as a means of improving code quality. Since humans are poor at repetitive tasks, some form of tool support is valuable. To that end we developed a p...
Stefan Axelsson, Dejan Baca, Robert Feldt, Darius ...
ICCAD
1997
IEEE
106views Hardware» more  ICCAD 1997»
15 years 6 months ago
BIST TPG for faults in system backplanes
A built-in self-test (BIST) methodology to test system backplanes by using BIST functionality in each of its constituent boards is presented. Since the configurations of systems ...
Chen-Huan Chiang, Sandeep K. Gupta
155
Voted
ASAP
2004
IEEE
141views Hardware» more  ASAP 2004»
15 years 6 months ago
Evaluating Instruction Set Extensions for Fast Arithmetic on Binary Finite Fields
Binary finite fields GF(2n ) are very commonly used in cryptography, particularly in publickey algorithms such as Elliptic Curve Cryptography (ECC). On word-oriented programmable ...
A. Murat Fiskiran, Ruby B. Lee
PDPTA
2007
15 years 3 months ago
Communication with Super Flexible Messaging
Abstract Super Flexible Messaging (SFM) provides a powerful and elegant message passing abstraction for transferring arbitrary data between remote processes. SFM achieves the simpl...
Alexey Fedosov, Gregory Benson