Sciweavers

2945 search results - page 46 / 589
» Designing and Implementing Malicious Hardware
Sort
View
INDOCRYPT
2010
Springer
15 years 2 months ago
One Byte per Clock: A Novel RC4 Hardware
RC4, the widely used stream cipher, is well known for its simplicity and ease of implementation in software. In case of a special purpose hardware designed for RC4, the best known ...
Sourav Sengupta, Koushik Sinha, Subhamoy Maitra, B...
DAC
2008
ACM
16 years 5 months ago
Symbolic noise analysis approach to computational hardware optimization
This paper addresses the problem of computational error modeling and analysis. Choosing different word-lengths for each functional unit in hardware implementations of numerical al...
Arash Ahmadi, Mark Zwolinski
ICCS
2007
Springer
15 years 10 months ago
A Combined Hardware/Software Optimization Framework for Signal Representation and Recognition
This paper describes a signal recognition system that is jointly optimized from mathematical representation, algorithm design and final implementation. The goal is to exploit sign...
Melina Demertzi, Pedro C. Diniz, Mary W. Hall, Ann...
ISCAS
2007
IEEE
106views Hardware» more  ISCAS 2007»
15 years 10 months ago
Area-Power Efficient Lifting-Based DWT Hardware for Implantable Neuroprosthetics
— Discrete wavelet transform (DWT) has been shown to provide exceptionally efficient data compression for neural records. This paper describes an area-power minimized hardware im...
Awais M. Kamboh, Matthew Raetz, Andrew Mason, Kari...
CASES
2009
ACM
15 years 10 months ago
Hardware evaluation of the Luffa hash family
Efficient hardware architectures for the Luffa hash algorithm are proposed in this work. We explore different tradeoffs and propose several architectures, targeting both compac...
Miroslav Knezevic, Ingrid Verbauwhede