Sciweavers

434 search results - page 57 / 87
» Logical Analysis of Hash Functions
Sort
View
84
Voted
DATE
2007
IEEE
92views Hardware» more  DATE 2007»
15 years 6 months ago
Overcoming glitches and dissipation timing skews in design of DPA-resistant cryptographic hardware
Cryptographic embedded systems are vulnerable to Differential Power Analysis (DPA) attacks. In this paper, we propose a logic design style, called as Precharge Masked Reed-Muller ...
Kuan Jen Lin, Shan Chien Fang, Shih Hsien Yang, Ch...
GLVLSI
2009
IEEE
146views VLSI» more  GLVLSI 2009»
15 years 4 months ago
A reconfigurable stochastic architecture for highly reliable computing
Mounting concerns over variability, defects and noise motivate a new approach for integrated circuits: the design of stochastic logic, that is to say, digital circuitry that opera...
Xin Li, Weikang Qian, Marc D. Riedel, Kia Bazargan...
138
Voted
DICTA
2007
15 years 1 months ago
An in Depth Comparison of Four Texture Segmentation Methods
Texture segmentation is the process of partitioning an image into regions with different textures containing similar group of pixels. This paper presents a comparative study of fo...
Vamsi Krishna Madasu, Prasad K. D. V. Yarlagadda
FMCAD
2009
Springer
15 years 4 months ago
Generalized, efficient array decision procedures
Abstract--The theory of arrays is ubiquitous in the context of software and hardware verification and symbolic analysis. The basic array theory was introduced by McCarthy and allow...
Leonardo Mendonça de Moura, Nikolaj Bj&osla...
84
Voted
SE
2008
15 years 1 months ago
Eliminating Trust From Application Programs By Way Of Software Architecture
: In many of today's application programs, security functionality is inseparably intertwined with the actual mission-purpose logic. As a result, the trusted code base is unnec...
Michael Franz