Sciweavers

1957 search results - page 14 / 392
» Embedded Processor Security
Sort
View
CODES
1999
IEEE
13 years 11 months ago
An ASIP design methodology for embedded systems
A well-known challenge during processor design is to obtain the best possible results for a typical target application domain that is generally described as a set of benchmarks. O...
Kayhan Küçükçakar
VLSID
2005
IEEE
102views VLSI» more  VLSID 2005»
14 years 7 months ago
Rapid Embedded Hardware/Software System Generation
This paper presents an RTL generation scheme for a SimpleScalar / PISA Instruction set architecture with system calls to implement C programs. The scheme utilizes ASIPmeister, a p...
Jorgen Peddersen, Seng Lin Shee, Andhi Janapsatya,...
WISTP
2007
Springer
14 years 1 months ago
An Information Flow Verifier for Small Embedded Systems
Dorina Ghindici, Gilles Grimaud, Isabelle Simplot-...
ESORICS
1998
Springer
13 years 11 months ago
MPEG PTY-Marks: Cheap Detection of Embedded Copyright Data in DVD-Video
Jean-Paul M. G. Linnartz, Joop Talstra
ICISC
2009
132views Cryptology» more  ICISC 2009»
13 years 5 months ago
Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications
Abstract. The design of embedded processors demands a careful tradeoff between many conflicting objectives such as performance, silicon area and power consumption. Finding such a t...
Johann Großschädl, Elisabeth Oswald, Da...