Sciweavers

1446 search results - page 92 / 290
» Formal analysis of hardware requirements
Sort
View
CHARME
2005
Springer
143views Hardware» more  CHARME 2005»
14 years 2 months ago
Saturation-Based Symbolic Reachability Analysis Using Conjunctive and Disjunctive Partitioning
Abstract. We propose a new saturation-based symbolic state-space generation algorithm for finite discrete-state systems. Based on the structure of the high-level model specificat...
Gianfranco Ciardo, Andy Jinqing Yu
CHES
1999
Springer
140views Cryptology» more  CHES 1999»
14 years 1 months ago
Power Analysis Attacks of Modular Exponentiation in Smartcards
Abstract. Three new types of power analysis attacks against smartcard implementations of modular exponentiation algorithms are described. The first attack requires an adversary to ...
Thomas S. Messerges, Ezzy A. Dabbish, Robert H. Sl...
CARDIS
2008
Springer
146views Hardware» more  CARDIS 2008»
13 years 11 months ago
Provably Secure Grouping-Proofs for RFID Tags
We investigate an application of RFIDs referred to in the literature as group scanning, in which several tags are "simultaneously" scanned by a reader device. Our goal is...
Mike Burmester, Breno de Medeiros, Rossana Motta
ISCAS
2006
IEEE
127views Hardware» more  ISCAS 2006»
14 years 3 months ago
On-die decoupling capacitance: frequency domain analysis of activity radius
—On-die capacitances interact with the inductance and resistance of the power distribution network to supply electrical charge. A distributed model is generally required to analy...
Michael Sotman, Avinoam Kolodny, Mikhail Popovich,...
ISCAS
2002
IEEE
121views Hardware» more  ISCAS 2002»
14 years 2 months ago
Analog filter adaptation using a dithered linear search algorithm
A variation of the differential steepest descent algorithm, here called the dithered linear search (DLS), is examined and applied to analog filter adaptation. The DLS algorithm is...
Anthony Chan Carusone, David A. Johns