Sciweavers

1957 search results - page 92 / 392
» Embedded Processor Security
Sort
View
113
Voted
IEICET
2008
147views more  IEICET 2008»
15 years 2 months ago
Computing the Ate Pairing on Elliptic Curves with Embedding Degree k = 9
For AES 128 security level there are several natural choices for pairing-friendly elliptic curves. In particular, as we will explain, one might choose curves with k = 9 or curves w...
Xibin Lin, Changan Zhao, Fangguo Zhang, Yanming Wa...
126
Voted
DATE
2004
IEEE
174views Hardware» more  DATE 2004»
15 years 6 months ago
Graph-Based Functional Test Program Generation for Pipelined Processors
Functional verification is widely acknowledged as a major bottleneck in microprocessor design. While early work on specification driven functional test program generation has prop...
Prabhat Mishra, Nikil Dutt
133
Voted
ENTCS
2006
128views more  ENTCS 2006»
15 years 2 months ago
A Prolog Framework for the Rapid Prototyping of Language Processors with Attribute Grammars
In this paper, we describe PAG (Prototyping with Attribute Grammars), a framework for building Prolog prototypes from specifications based on attribute grammars, which we have dev...
José Luis Sierra, Alfredo Fernández-...
106
Voted
DAC
2007
ACM
16 years 3 months ago
RISPP: Rotating Instruction Set Processing Platform
Adaptation in embedded processing is key in order to address efficiency. The concept of extensible embedded processors works well if a few a-priori known hot spots exist. However,...
Jörg Henkel, Lars Bauer, Muhammad Shafique, S...
IPPS
2005
IEEE
15 years 8 months ago
A Hardware Acceleration Unit for MPI Queue Processing
With the heavy reliance of modern scientific applications upon the MPI Standard, it has become critical for the implementation of MPI to be as capable and as fast as possible. Th...
Keith D. Underwood, K. Scott Hemmert, Arun Rodrigu...