Sciweavers

923 search results - page 137 / 185
» Improved Slide Attacks
Sort
View
FPGA
2006
ACM
93views FPGA» more  FPGA 2006»
15 years 7 months ago
Measuring the gap between FPGAs and ASICs
This paper presents experimental measurements of the differences between a 90nm CMOS FPGA and 90nm CMOS Standard Cell ASICs in terms of logic density, circuit speed and power cons...
Ian Kuon, Jonathan Rose
134
Voted
AINA
2003
IEEE
15 years 7 months ago
Signature Schemes Based on Two Hard Problems Simultaneously
In 1994, Harn proposed a signature scheme based on the modified ElGamal's scheme and claimed that the security relies on both of the factorization and the discrete logarithm....
Ching-Te Wang, Chu-Hsing Lin, Chin-Chen Chang
DATE
2000
IEEE
92views Hardware» more  DATE 2000»
15 years 7 months ago
An Efficient Heuristic Approach to Solve the Unate Covering Problem
The classical solving approach for two-level logic minimisation reduces the problem to a special case of unate covering and attacks the latter with a (possibly limited) branch-and...
Roberto Cordone, Fabrizio Ferrandi, Donatella Sciu...
123
Voted
HOTDEP
2008
157views Hardware» more  HOTDEP 2008»
15 years 6 months ago
Byzantium: Byzantine-Fault-Tolerant Database Replication Providing Snapshot Isolation
Database systems are a key component behind many of today's computer systems. As a consequence, it is crucial that database systems provide correct and continuous service des...
Nuno M. Preguiça, Rodrigo Rodrigues, Crist&...
USS
2008
15 years 6 months ago
Experiences with Model Inference Assisted Fuzzing
In this paper we introduce the idea of model inference assisted fuzzing aimed to cost effectively improve software security. We experimented with several model inference technique...
Joachim Viide, Aki Helin, Marko Laakso, Pekka Piet...