Sciweavers

861 search results - page 81 / 173
» Internal implementation
Sort
View
DSD
2006
IEEE
98views Hardware» more  DSD 2006»
15 years 1 months ago
Profiling Bluetooth and Linux on the Xilinx Virtex II Pro
In this paper, we present profiling results of the Bluetooth standard implemented on the Xilinx Virtex II Pro device. The investigation is performed in two stages. First, we solel...
Filipa Duarte, Stephan Wong
CLUSTER
2000
IEEE
15 years 1 months ago
Madeleine II: a Portable and Efficient Communication Library for High-Performance Cluster Computing
This paper introduces MadeleineII, a new adaptive and portable multi-protocol implementation of the Madeleine communication library. MadeleineII has the ability to control multipl...
Olivier Aumage, Luc Bougé, Alexandre Denis,...
SC
1995
ACM
15 years 1 months ago
A Performance Evaluation of the Convex SPP-1000 Scalable Shared Memory Parallel Computer
The Convex SPP-1000 is the first commercial implementation of a new generation of scalable shared memory parallel computers with full cache coherence. It employs a hierarchical s...
Thomas L. Sterling, Daniel Savarese, Peter MacNeic...
CTRSA
2010
Springer
152views Cryptology» more  CTRSA 2010»
15 years 1 months ago
Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs
This paper proposes a new type of cache-collision timing attacks on software implementations of AES. Our major technique is of differential nature and is based on the internal cryp...
Andrey Bogdanov, Thomas Eisenbarth, Christof Paar,...
CHES
2008
Springer
84views Cryptology» more  CHES 2008»
14 years 12 months ago
A Real-World Attack Breaking A5/1 within Hours
Abstract. In this paper we present a real-world hardware-assisted attack on the wellknown A5/1 stream cipher which is (still) used to secure GSM communication in most countries all...
Timo Gendrullis, Martin Novotný, Andy Rupp