Sciweavers

632 search results - page 64 / 127
» The Basics of Performance-Monitoring Hardware
Sort
View
CASES
2009
ACM
15 years 2 months ago
Automatic detection of fault attack and countermeasures
Security of smart cards is continuously threatened by many software and hardware attacks. Those attacks focus on giving secret information that are stored in the card like PIN cod...
Ahmadou A. Sere, Julien Iguchi-Cartigny, Jean-Loui...
IEEEPACT
1999
IEEE
15 years 2 months ago
A Multithreaded Java Microcontroller for Thread-Oriented Real-Time Event Handling
We propose a multithreaded Java microcontroller-called Komodo microcontroller--with a new hardware event handling mechanism that allows handling of simultaneous overlapping events...
Uwe Brinkschulte, C. Krakowski, Jochen Kreuzinger,...
PDP
1997
IEEE
15 years 2 months ago
Language and library support for practical PRAM programming
We investigate the well-known PRAM model of parallel computation as a practical parallel programming model. The two components of this project are a general-purpose PRAM programmin...
Christoph W. Keßler, Jesper Larsson Trä...
FIWAC
1993
139views Cryptology» more  FIWAC 1993»
15 years 1 months ago
Montgomery-Suitable Cryptosystems
Montgomery’s algorithm [8], hereafter denoted Mn(·, ·), is a process for computing Mn(A, B) = ABN mod n where N is a constant factor depending only on n. Usually, AB mod n is o...
David Naccache, David M'Raïhi
DAC
2010
ACM
15 years 1 months ago
Theoretical analysis of gate level information flow tracking
Understanding the flow of information is an important aspect in computer security. There has been a recent move towards tracking information in hardware and understanding the flow...
Jason Oberg, Wei Hu, Ali Irturk, Mohit Tiwari, Tim...