Sciweavers

13181 search results - page 154 / 2637
» Design and Implementation of Cohesion
Sort
View
CHES
2004
Springer
121views Cryptology» more  CHES 2004»
14 years 3 months ago
Power Analysis of an FPGA: Implementation of Rijndael: Is Pipelining a DPA Countermeasure?
Since their publication in 1998, power analysis attacks have attracted signiļ¬cant attention within the cryptographic community. So far, they have been successfully applied to diļ...
François-Xavier Standaert, Siddika Berna &O...
ISORC
1999
IEEE
14 years 2 months ago
Implementing the Real-Time Publisher/Subscriber Model on the Controller Area Network (CAN)
Designing distributed real-time systems as being composed of communicating objects offers many advantages with respect to modularity and extensibility of these systems. However, d...
Jörg Kaiser, Michael Mock
DSD
2010
IEEE
133views Hardware» more  DSD 2010»
13 years 7 months ago
Area and Speed Oriented Implementations of Asynchronous Logic Operating under Strong Constraints
Asynchronous circuit implementations operating under strong constraints (DIMS, Direct Logic, some of NCL gates, etc.) are attractive due to: 1) regularity; 2) combined implementati...
Igor Lemberski, Petr Fiser
GTTSE
2007
Springer
14 years 4 months ago
Evolving a DSL Implementation
Abstract. Domain Speciļ¬c Languages (DSLs) are small languages designed for use in a speciļ¬c domain. DSLs typically evolve quite radically throughout their lifetime, but current...
Laurence Tratt
CHES
2009
Springer
265views Cryptology» more  CHES 2009»
14 years 10 months ago
Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers
Differential Power Analysis (DPA) is a powerful side channel key recovery attack that efficiently breaks block ciphers implementations. In software, two main techniques are usually...
Matthieu Rivain, Emmanuel Prouff, Julien Doget