Sciweavers

826 search results - page 142 / 166
» Designing for families
Sort
View
SP
2007
IEEE
108views Security Privacy» more  SP 2007»
14 years 1 months ago
Trojan Detection using IC Fingerprinting
Hardware manufacturers are increasingly outsourcing their IC fabrication work overseas due to much lower costs. This poses a significant security risk for ICs used for critical m...
Dakshi Agrawal, Selçuk Baktir, Deniz Karako...
IESS
2007
Springer
120views Hardware» more  IESS 2007»
14 years 28 days ago
Error Containment in the Time-Triggered System-On-a-Chip Architecture
Abstract: The time-triggered System-on-a-Chip (SoC) architecture provides a generic multicore system platform for a family of composable and dependable giga-scale SoCs. It supports...
Roman Obermaisser, Hermann Kopetz, Christian El Sa...
CRYPTO
2004
Springer
112views Cryptology» more  CRYPTO 2004»
14 years 5 days ago
Feistel Schemes and Bi-linear Cryptanalysis
Abstract. In this paper we introduce the method of bi-linear cryptanalysis (BLC), designed specifically to attack Feistel ciphers. It allows to construct periodic biased character...
Nicolas Courtois
GROUP
2009
ACM
13 years 11 months ago
Musical fingerprints: collaboration around home media collections
As people collect more and more digital music, photos, and video, the growing scale of the collection challenges how families share and collaborate around home media collections. ...
Robin Sease, David W. McDonald
FPGA
2000
ACM
141views FPGA» more  FPGA 2000»
13 years 10 months ago
Tolerating operational faults in cluster-based FPGAs
In recent years the application space of reconfigurable devices has grown to include many platforms with a strong need for fault tolerance. While these systems frequently contain ...
Vijay Lakamraju, Russell Tessier