Sciweavers

201 search results - page 37 / 41
» Design, Implementation and Deployment of State Machines Usin...
Sort
View
CHES
2007
Springer
157views Cryptology» more  CHES 2007»
14 years 1 months ago
A Hardware-Assisted Realtime Attack on A5/2 Without Precomputations
Abstract. A5/2 is a synchronous stream cipher that is used for protecting GSM communication. Recently, some powerful attacks [2,10] on A5/2 have been proposed. In this contribution...
Andrey Bogdanov, Thomas Eisenbarth, Andy Rupp
BMCBI
2008
214views more  BMCBI 2008»
13 years 7 months ago
Accelerating String Set Matching in FPGA Hardware for Bioinformatics Research
Background: This paper describes techniques for accelerating the performance of the string set matching problem with particular emphasis on applications in computational proteomic...
Yoginder S. Dandass, Shane C. Burgess, Mark Lawren...
GLVLSI
2003
IEEE
132views VLSI» more  GLVLSI 2003»
14 years 25 days ago
A highly regular multi-phase reseeding technique for scan-based BIST
In this paper a novel reseeding architecture for scan-based BIST, which uses an LFSR as TPG, is proposed. Multiple cells of the LFSR are utilized as sources for feeding the scan c...
Emmanouil Kalligeros, Xrysovalantis Kavousianos, D...
SIGCOMM
2012
ACM
11 years 10 months ago
Picasso: flexible RF and spectrum slicing
This paper presents the design, implementation and evaluation of Picasso, a novel radio design that allows simultaneous transmission and reception on separate and arbitrary spectr...
Steven Siying Hong, Jeffrey Mehlman, Sachin Rajsek...
CLUSTER
2000
IEEE
13 years 12 months ago
Partition Repositories for Partition Cloning - OS Independent Software Maintenance in Large Clusters of PCs
As a novel approach to software maintenance in large clusters of PCs requiring multiple OS installations we implemented partition cloning and partition repositories as well as a s...
Felix Rauch, Christian Kurmann, Thomas Stricker