Sciweavers

2945 search results - page 123 / 589
» Designing and Implementing Malicious Hardware
Sort
View
ICCD
1992
IEEE
82views Hardware» more  ICCD 1992»
15 years 8 months ago
A Comparison of Self-Timed Design Using FPGA, CMOS, and GaAs Technologies
Asynchronous or self-timed systems that do not rely on a global clock to keep system components synchronized can offer significant advantages over traditional clocked circuits in ...
Erik Brunvand, Nick Michell, Kent F. Smith
IEEEPACT
2006
IEEE
15 years 10 months ago
Testing implementations of transactional memory
Transactional memory is an attractive design concept for scalable multiprocessors because it offers efficient lock-free synchronization and greatly simplifies parallel software....
Chaiyasit Manovit, Sudheendra Hangal, Hassan Chafi...
CHES
2004
Springer
121views Cryptology» more  CHES 2004»
15 years 10 months ago
Power Analysis of an FPGA: Implementation of Rijndael: Is Pipelining a DPA Countermeasure?
Since their publication in 1998, power analysis attacks have attracted significant attention within the cryptographic community. So far, they have been successfully applied to di...
François-Xavier Standaert, Siddika Berna &O...
EUROMICRO
2003
IEEE
15 years 10 months ago
An Implementation of an Overlay Network Architecture Scheme for Streaming Media Distribution
In this paper we introduce the implementation of a streaming video distribution scheme based on client relay modules. The purpose is the formation and maintenance of an overlay ne...
Charalampos Z. Patrikakis, Y. Despotopoulos, Andre...
CLUSTER
2006
IEEE
15 years 10 months ago
Cluster-based IP Router: Implementation and Evaluation
IP routers are now increasingly expected to do more than just traditional packet forwarding – they must be extensible as well as scalable. It is a challenge to design a router a...
Qinghua Ye, Mike H. MacGregor