Sciweavers

13181 search results - page 154 / 2637
» Design and Implementation of Cohesion
Sort
View
CHES
2004
Springer
121views Cryptology» more  CHES 2004»
15 years 8 months ago
Power Analysis of an FPGA: Implementation of Rijndael: Is Pipelining a DPA Countermeasure?
Since their publication in 1998, power analysis attacks have attracted significant attention within the cryptographic community. So far, they have been successfully applied to diļ...
François-Xavier Standaert, Siddika Berna &O...
ISORC
1999
IEEE
15 years 7 months ago
Implementing the Real-Time Publisher/Subscriber Model on the Controller Area Network (CAN)
Designing distributed real-time systems as being composed of communicating objects offers many advantages with respect to modularity and extensibility of these systems. However, d...
Jörg Kaiser, Michael Mock
DSD
2010
IEEE
133views Hardware» more  DSD 2010»
15 years 15 days ago
Area and Speed Oriented Implementations of Asynchronous Logic Operating under Strong Constraints
Asynchronous circuit implementations operating under strong constraints (DIMS, Direct Logic, some of NCL gates, etc.) are attractive due to: 1) regularity; 2) combined implementati...
Igor Lemberski, Petr Fiser
117
Voted
GTTSE
2007
Springer
15 years 9 months ago
Evolving a DSL Implementation
Abstract. Domain Specific Languages (DSLs) are small languages designed for use in a specific domain. DSLs typically evolve quite radically throughout their lifetime, but current...
Laurence Tratt
CHES
2009
Springer
265views Cryptology» more  CHES 2009»
16 years 3 months ago
Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers
Differential Power Analysis (DPA) is a powerful side channel key recovery attack that efficiently breaks block ciphers implementations. In software, two main techniques are usually...
Matthieu Rivain, Emmanuel Prouff, Julien Doget