Sciweavers

623 search results - page 76 / 125
» Side-Channel Issues for Designing Secure Hardware Implementa...
Sort
View
142
Voted
TC
2010
14 years 10 months ago
Faster Interleaved Modular Multiplication Based on Barrett and Montgomery Reduction Methods
This paper proposes two improved interleaved modular multiplication algorithms based on Barrett and Montgomery modular reduction. The algorithms are simple and especially suitable ...
Miroslav Knezevic, Frederik Vercauteren, Ingrid Ve...
122
Voted
ICEIS
2003
IEEE
15 years 9 months ago
Toxic Farm: A Cooperative Management Platform for Virtual Teams and Enterprises
: The proliferation of the Internet has revolutionized the way people work together for business. People located at remote places can collaborate across organizational and national...
Hala Skaf-Molli, Pascal Molli, Gérald Oster...
134
Voted
USENIX
2003
15 years 5 months ago
The Design of the {OpenBSD} Cryptographic Framework
Cryptographic transformations are a fundamental building block in many security applications and protocols. To improve performance, several vendors market hardware accelerator car...
Angelos D. Keromytis, Jason L. Wright, Theo de Raa...
118
Voted
DATE
2003
IEEE
118views Hardware» more  DATE 2003»
15 years 9 months ago
Transforming Structural Model to Runtime Model of Embedded Software with Real-Time Constraints
The model-based methodology has proven to be effective for fast and low-cost development of embedded software. In the model-based development process, transforming a software stru...
Sharath Kodase, Shige Wang, Kang G. Shin
94
Voted
DATE
2007
IEEE
66views Hardware» more  DATE 2007»
15 years 10 months ago
Yield-aware placement optimization
ct In this paper we describe a methodology addressing the issue of avoiding yield hazardous cell abutments during placement. This is made possible by accurate characterization of t...
Paolo Azzoni, Massimo Bertoletti, Nicola Dragone, ...