Sciweavers

1045 search results - page 89 / 209
» Improving SHA-2 Hardware Implementations
Sort
View
VIIP
2001
13 years 11 months ago
Using Graphics Cards for Quantized FEM Computations
Graphics cards exercise increasingly more computing power and are highly optimized for high data transfer volumes. In contrast typical workstations perform badly when data exceeds...
Martin Rumpf, Robert Strzodka
CRYPTO
2010
Springer
158views Cryptology» more  CRYPTO 2010»
13 years 11 months ago
Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography
Motivated by the question of basing cryptographic protocols on stateless tamper-proof hardware tokens, we revisit the question of unconditional two-prover zero-knowledge proofs fo...
Vipul Goyal, Yuval Ishai, Mohammad Mahmoody, Amit ...
CODES
2011
IEEE
12 years 9 months ago
SoC-TM: integrated HW/SW support for transactional memory programming on embedded MPSoCs
Two overriding concerns in the development of embedded MPSoCs are ease of programming and hardware complexity. In this paper we present SoC-TM, an integrated HW/SW solution for tr...
Cesare Ferri, Andrea Marongiu, Benjamin Lipton, R....
ICCD
2007
IEEE
190views Hardware» more  ICCD 2007»
14 years 7 months ago
Hybrid resistor/FET-logic demultiplexer architecture design for hybrid CMOS/nanodevice circuits
Hybrid nanoelectronics are emerging as one viable option to sustain the Moore’s Law after the CMOS scaling limit is reached. One main design challenge in hybrid nanoelectronics ...
Shu Li, Tong Zhang
ICCAD
2008
IEEE
98views Hardware» more  ICCAD 2008»
14 years 6 months ago
Performance optimization of elastic systems using buffer resizing and buffer insertion
Abstract—Buffer resizing and buffer insertion are two transformation techniques for the performance optimization of elastic systems. Different approaches for each technique have ...
Dmitry Bufistov, Jorge Júlvez, Jordi Cortad...