Sciweavers

1045 search results - page 149 / 209
» Improving SHA-2 Hardware Implementations
Sort
View
IEEEPACT
2006
IEEE
14 years 1 months ago
Region array SSA
Static Single Assignment (SSA) has become the intermediate program representation of choice in most modern compilers because it enables efficient data flow analysis of scalars an...
Silvius Rus, Guobin He, Christophe Alias, Lawrence...
ISCAS
2006
IEEE
214views Hardware» more  ISCAS 2006»
14 years 1 months ago
Multimode digital SMPS controller IC for low-power management
This paper introduces a novel low-power digital future, are expected to run at frequencies beyond 10 MHz. In controller for high frequency dc-dc switch-mode power supplies addition...
N. Rahman, A. Parayandeh, Kun Wang, A. Prodic
LCN
2006
IEEE
14 years 1 months ago
Efficient Packet Processing in User-Level OSes: A Study of UML
Network server consolidation has become popular through recent virtualization technology that builds secure, isolated network systems on shared hardware. One of the virtualization...
Younggyun Koh, Calton Pu, Sapan Bhatia, Charles Co...
CAV
2005
Springer
127views Hardware» more  CAV 2005»
14 years 1 months ago
Incremental and Complete Bounded Model Checking for Full PLTL
Bounded model checking is an efficient method for finding bugs in system designs. The major drawback of the basic method is that it cannot prove properties, only disprove them. R...
Keijo Heljanko, Tommi A. Junttila, Timo Latvala
FSE
2004
Springer
90views Cryptology» more  FSE 2004»
14 years 1 months ago
Fast Software-Based Attacks on SecurID
SecurID is a widely used hardware token for strengthening authentication in a corporate environment. Recently, Biryukov, Lano, and Preneel presented an attack on the alleged SecurI...
Scott Contini, Yiqun Lisa Yin