Sciweavers

1210 search results - page 166 / 242
» Secure Logic Synthesis
Sort
View
DAC
1994
ACM
15 years 7 months ago
Optimum Functional Decomposition Using Encoding
In this paper, we revisit the classical problem of functional decomposition [1, 2] that arises so often in logic synthesis. One basic problem that has remained largely unaddressed...
Rajeev Murgai, Robert K. Brayton, Alberto L. Sangi...
SIGMOD
2003
ACM
127views Database» more  SIGMOD 2003»
16 years 3 months ago
Closing the key loophole in MLS databases
: There has been an abundance of research within the last couple of decades in the area of multilevel secure (MLS) databases. Recent work in this field deals with the processing of...
Nenad Jukic, Svetlozar Nestorov, Susan V. Vrbsky
CHES
2005
Springer
80views Cryptology» more  CHES 2005»
15 years 9 months ago
Successfully Attacking Masked AES Hardware Implementations
During the last years, several masking schemes for AES have been proposed to secure hardware implementations against DPA attacks. In order to investigate the effectiveness of thes...
Stefan Mangard, Norbert Pramstaller, Elisabeth Osw...
OSDI
2004
ACM
16 years 4 months ago
Enhancing Server Availability and Security Through Failure-Oblivious Computing
We present a new technique, failure-oblivious computing, that enables servers to execute through memory errors without memory corruption. Our safe compiler for C inserts checks th...
Martin C. Rinard, Cristian Cadar, Daniel Dumitran,...
126
Voted
AAAI
1998
15 years 5 months ago
An Expert System for Alarm System Planning
This paper discusses the design and implementation of ESSPL, an expert system which generates security plans for alarm systems (Figure 1). Security planning is the task of determi...
Akira Tsurushima, Kenji Urushima, Daigo Sakata, Hi...