Sciweavers

6318 search results - page 10 / 1264
» Data Leakage Detection
Sort
View
ICCAD
2009
IEEE
121views Hardware» more  ICCAD 2009»
14 years 7 months ago
MOLES: Malicious off-chip leakage enabled by side-channels
Economic incentives have driven the semiconductor industry to separate design from fabrication in recent years. This trend leads to potential vulnerabilities from untrusted circui...
Lang Lin, Wayne Burleson, Christof Paar
GLOBECOM
2007
IEEE
15 years 4 months ago
Spatial Multiplexing in the Multi-User MIMO Downlink Based on Signal-to-Leakage Ratios
Abstract—Spatial multiplexing in the multi-user MIMO (MUMIMO) downlink allows each user in the system to receive multiple data subchannels simultaneously using the same time and ...
Melvin C. H. Lim, Mounir Ghogho, Desmond C. McLern...
75
Voted
ASPDAC
2009
ACM
127views Hardware» more  ASPDAC 2009»
15 years 4 months ago
Timing driven power gating in high-level synthesis
- The power gating technique is useful in reducing standby leakage current, but it increases the gate delay. For a functional unit, its maximum allowable delay (for a target clock ...
Shih-Hsu Huang, Chun-Hua Cheng
ISCAS
2007
IEEE
132views Hardware» more  ISCAS 2007»
15 years 3 months ago
High Read Stability and Low Leakage Cache Memory Cell
- Data in conventional six transistor (6T) static random access memory (SRAM) cells are vulnerable to noise due to the direct access to the data storage nodes through the bit lines...
Zhiyu Liu, Volkan Kursun
CHES
2004
Springer
230views Cryptology» more  CHES 2004»
15 years 3 months ago
Correlation Power Analysis with a Leakage Model
Abstract. A classical model is used for the power consumption of cryptographic devices. It is based on the Hamming distance of the data handled with regard to an unknown but consta...
Eric Brier, Christophe Clavier, Francis Olivier