Sciweavers

ASPDAC
2015
ACM
8views Hardware» more  ASPDAC 2015»
8 years 6 months ago
Multiple Independent Gate FETs: How many gates do we need?
— Multiple Independent Gate Field Effect Transistors (MIGFETs) are expected to push FET technology further into the semiconductor roadmap. In a MIGFET, supplementary gates either...
Luca Gaetano Amarù, Gage Hills, Pierre-Emma...
ASPDAC
2015
ACM
2views Hardware» more  ASPDAC 2015»
8 years 6 months ago
On test syndrome merging for reasoning-based board-level functional fault diagnosis
Machine learning algorithms are advocated for automated diagnosis of board-level functional failures due to the extreme complexity of the problem. Such reasoning-based solutions, ...
Zelong Sun, Li Jiang, Qiang Xu, Zhaobo Zhang, Zhiy...
ASPDAC
2015
ACM
7views Hardware» more  ASPDAC 2015»
8 years 6 months ago
An oscillator-based true random number generator with process and temperature tolerance
—This paper presents an oscillator-based true random number generator (TRNG) that automatically adjusts the duty cycle of a fast oscillator to 50 %, and generates unbiased random...
Takehiko Amaki, Masanori Hashimoto, Takao Onoye
ASMTA
2015
Springer
27views Mathematics» more  ASMTA 2015»
8 years 6 months ago
Interconnected Wireless Sensors with Energy Harvesting
This paper studies interconnected wireless sensors with the paradigm of Energy Packet Networks (EPN) which were previously introduced. In the EPN model, both data transmissions and...
Erol Gelenbe, Andrea Marin
ASIACRYPT
2015
Springer
8 years 6 months ago
Property Preserving Symmetric Encryption Revisited
At EUROCRYPT 2012 Pandey and Rouselakis introduced the notion of property preserving symmetric encryption which enables checking for a property on plaintexts by running a public te...
Sanjit Chatterjee, M. Prem Laxman Das
ASIACRYPT
2015
Springer
8 years 6 months ago
Oblivious Network RAM and Leveraging Parallelism to Achieve Obliviousness
Dana Dachman-Soled, Chang Liu, Charalampos Papaman...
ASIACRYPT
2015
Springer
8 years 6 months ago
Idealizing Identity-Based Encryption
We formalize the standard application of identity-based encryption (IBE), namely noninteractive secure communication, as realizing an ideal system which we call delivery controlle...
Dennis Hofheinz, Christian Matt 0002, Ueli Maurer
ASIACRYPT
2015
Springer
8 years 6 months ago
On the Optimality of Non-Linear Computations of Length-Preserving Encryption Schemes
Abstract. It is well known that three and four rounds of balanced Feistel cipher or Luby-Rackoff (LR) encryption for two blocks messages are pseudorandom permutation (PRP) and str...
Mridul Nandi
ASIACRYPT
2015
Springer
8 years 6 months ago
An Inverse-Free Single-Keyed Tweakable Enciphering Scheme
In CRYPTO 2003, Halevi and Rogaway proposed CMC, a tweakable enciphering scheme (TES) based on a blockcipher. It requires two blockcipher keys and it is not inverse-free (i.e., the...
Ritam Bhaumik, Mridul Nandi
ASIACRYPT
2015
Springer
8 years 6 months ago
Conversions Among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs
Predicate encryption is an advanced form of public-key encryption that yield high flexibility in terms of access control. In the literature, many predicate encryption schemes hav...
Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yam...