Sciweavers

2945 search results - page 31 / 589
» Designing and Implementing Malicious Hardware
Sort
View
SAS
2007
Springer
108views Formal Methods» more  SAS 2007»
15 years 10 months ago
Programming Language Design and Analysis Motivated by Hardware Evolution
Abstract. Silicon chip design has passed a threshold whereby exponentially increasing transistor density (Moore’s Law) no longer translates into increased processing power for si...
Alan Mycroft
IAJIT
2006
145views more  IAJIT 2006»
15 years 4 months ago
Fast 160-Bits GF (P) Elliptic Curve Crypto Hardware of High-Radix Scalable Multipliers
In this paper, a fast hardware architecture for elliptic curve cryptography computation in Galois Field GF(p) is proposed. The architecture is implemented for 160-bits, as its dat...
Adnan Abdul-Aziz Gutub
IPPS
1997
IEEE
15 years 8 months ago
Design and Implementation of Virtual Memory-Mapped Communication on Myrinet
This paper describes the design and implementation of the virtual memory-mapped communicationmodel (VMMC) on a Myrinet network of PCI-based PCs. VMMC has been designed and impleme...
Cezary Dubnicki, Angelos Bilas, Kai Li
VLSID
2004
IEEE
212views VLSI» more  VLSID 2004»
16 years 4 months ago
On Design and Implementation of an Embedded Automatic Speech Recognition System
We present a new design of an Embedded Speech Recognition System. It combines the aspects of both hardware and software design to implement a speaker dependent, isolated word, sma...
Sujay Phadke, Rhishikesh Limaye, Siddharth Verma, ...
ICCD
2004
IEEE
138views Hardware» more  ICCD 2004»
16 years 27 days ago
Design and Implementation of Scalable Low-Power Montgomery Multiplier
In this paper, an efficient Montgomery multiplier is introduced for the modular exponentiation operation, which is fundamental to numerous public-key cryptosystems. Four aspects a...
Hee-Kwan Son, Sang-Geun Oh