Sciweavers

1045 search results - page 138 / 209
» Improving SHA-2 Hardware Implementations
Sort
View
CARDIS
2004
Springer
126views Hardware» more  CARDIS 2004»
14 years 1 months ago
Anonymous Services using Smart Cards and Cryptography
More and more services provided by Internet pose a problem of privacy and anonymity. One cryptographic tool that could be used for solving this problem is the group signature [1, 5...
Sébastien Canard, Jacques Traoré
DATE
2003
IEEE
69views Hardware» more  DATE 2003»
14 years 1 months ago
Performance-Directed Retiming for FPGAs Using Post-Placement Delay Information
In today’s deep-submicron designs, the interconnect delays contribute an increasing part to the overall performance of an implementation. Particularly when targeting field prog...
Ulrich Seidl, Klaus Eckl, Frank M. Johannes
ICCAD
2003
IEEE
205views Hardware» more  ICCAD 2003»
14 years 1 months ago
Statistical Timing Analysis for Intra-Die Process Variations with Spatial Correlations
Process variations have become a critical issue in performance verification of high-performance designs. We present a new, statistical timing analysis method that accounts for int...
Aseem Agarwal, David Blaauw, Vladimir Zolotov
ISCA
2003
IEEE
101views Hardware» more  ISCA 2003»
14 years 29 days ago
Overcoming the Limitations of Conventional Vector Processors
Despite their superior performance for multimedia applications, vector processors have three limitations that hinder their widespread acceptance. First, the complexity and size of...
Christoforos E. Kozyrakis, David A. Patterson
ISQED
2003
IEEE
85views Hardware» more  ISQED 2003»
14 years 29 days ago
Interoperability Beyond Design: Sharing Knowledge between Design and Manufacturing
The nature of IC design has is necessarily evolving to a more data-centric design flow in which EDA tools share a common information in a design database without the negative cost...
D. R. Cottrell, T. J. Grebinski