Sciweavers

BIRTHDAY
2012
Springer
14 years 12 days ago
The Logical Execution Time Paradigm
Embedded systems must interact with their real-time environment in a timely and dependable fashion. Most embeddedsystems architectures and design processes consider “nonfunction...
Christoph M. Kirsch, Ana Sokolova
BIRTHDAY
2012
Springer
14 years 12 days ago
Secret Key Leakage from Public Key Perturbation of DLP-Based Cryptosystems
Finding efficient countermeasures for cryptosystems against fault attacks is challenged by a constant discovery of flaws in designs. Even elements, such as public keys, that do no...
Alexandre Berzati, Cécile Canovas-Dumas, Lo...
BIRTHDAY
2012
Springer
14 years 12 days ago
A Qualitative Security Analysis of a New Class of 3-D Integrated Crypto Co-processors
3-D integration presents many new opportunities for architects and embedded systems designers. However, 3-D integration has not yet been explored by the cryptographic hardware com...
Jonathan Valamehr, Ted Huffmire, Cynthia E. Irvine...
BIRTHDAY
2012
Springer
14 years 12 days ago
How to Read a Signature?
In this note we describe a cryptographic curiosity: readable messages that carry their own digital signature.
Vanessa Gratzer, David Naccache
BIRTHDAY
2012
Springer
14 years 12 days ago
Deniable RSA Signature - The Raise and Fall of Ali Baba
The 40 thieves realize that the fortune in their cave is vanishing. A rumor says that Ali Baba has been granted access (in the form of a certificate) to the cave but they need evi...
Serge Vaudenay
BIRTHDAY
2012
Springer
14 years 12 days ago
Model Transformation By-Example: A Survey of the First Wave
Abstract. Model-Driven Engineering (MDE) places models as firstclass artifacts throughout the software lifecycle. In this context, model transformations are crucial for the succes...
Gerti Kappel, Philip Langer, Werner Retschitzegger...
BIRTHDAY
2012
Springer
14 years 12 days ago
Operand Folding Hardware Multipliers
This paper describes a new accumulate-and-add multiplication algorithm. The method partitions one of the operands and re-combines the results of computations done with each of the ...
Byungchun Chung, Sandra Marcello, Amir-Pasha Mirba...
ASPLOS
2012
ACM
14 years 12 days ago
ELI: bare-metal performance for I/O virtualization
Direct device assignment enhances the performance of guest virtual machines by allowing them to communicate with I/O devices without host involvement. But even with device assignm...
Abel Gordon, Nadav Amit, Nadav Har'El, Muli Ben-Ye...
ASPLOS
2012
ACM
14 years 12 days ago
Relyzer: exploiting application-level fault equivalence to analyze application resiliency to transient faults
Future microprocessors need low-cost solutions for reliable operation in the presence of failure-prone devices. A promising approach is to detect hardware faults by deploying low-...
Siva Kumar Sastry Hari, Sarita V. Adve, Helia Naei...
ASPLOS
2012
ACM
14 years 12 days ago
Understanding modern device drivers
Device drivers are the single largest contributor to operating-system kernel code with over 5 million lines of code in the Linux kernel, and cause significant complexity, bugs an...
Asim Kadav, Michael M. Swift