During the last years, several masking schemes for AES have been proposed to secure hardware implementations against DPA attacks. In order to investigate the effectiveness of thes...
Stefan Mangard, Norbert Pramstaller, Elisabeth Osw...
The paper describes the architecture of Brown University’s agent, Botticelli, a finalist in the 2003 Trading Agent Competition in Supply Chain Management (TAC SCM). In TAC SCM,...
Michael Benisch, Amy R. Greenwald, Ioanna Grypari,...
We combine interactive evolutionary computation (IEC) with existing evolutionary synthesis software for the design of micromachined resonators and evaluate its effectiveness using...
Raffi R. Kamalian, Hideyuki Takagi, Alice M. Agogi...
Abstract: As a result of variations in the fabrication process, different memory components are produced with different operational characteristics, a situation that complicates th...
This paper addresses the problem of locating the stuckopen faults in a manufactured IC with scan flip-flops. Unlike most previous methods that only aim at identifying the faulty s...