Sciweavers

2945 search results - page 12 / 589
» Designing and Implementing Malicious Hardware
Sort
View
103
Voted
IWANN
1993
Springer
15 years 3 months ago
Hardware Implementations of Artificial Neural Networks
Over the past decade a large variety of hardware has been designed to exploit the inherent parallelism of the artificial neural network models. This paper presents an overview of ...
Dante Del Corso
93
Voted
ICIP
2002
IEEE
16 years 1 months ago
Benchmarking and hardware implementation of JPEG-LS
The JPEG-LS algorithm is one of the recently designated standards for lossless compression of grayscale and color images. In this paper, simulation results for lossless and near l...
Andreas E. Savakis, Michael D. Piorun
IWSEC
2009
Springer
15 years 6 months ago
Tamper-Tolerant Software: Modeling and Implementation
Abstract. Common software-protection systems attempt to detect malicious observation and modification of protected applications. Upon tamper detection, anti-hacking code may produ...
Mariusz H. Jakubowski, Chit Wei Saw, Ramarathnam V...
134
Voted
FPGA
2003
ACM
161views FPGA» more  FPGA 2003»
15 years 4 months ago
Implementation of BEE: a real-time large-scale hardware emulation engine
This paper describes the hardware implementation of a real-time, large-scale, multi-chip FPGA (Field Programmable Gate Array) based emulation engine with a capacity of 10 million ...
Chen Chang, Kimmo Kuusilinna, Brian C. Richards, R...
IJNSEC
2010
247views more  IJNSEC 2010»
14 years 6 months ago
Hardware Implementation of Efficient Modified Karatsuba Multiplier Used in Elliptic Curves
The efficiency of the core Galois field arithmetic improves the performance of elliptic curve based public key cryptosystem implementation. This paper describes the design and imp...
Sameh M. Shohdy, Ashraf El-Sisi, Nabil A. Ismail