Sciweavers

1045 search results - page 96 / 209
» Improving SHA-2 Hardware Implementations
Sort
View
SAT
2010
Springer
132views Hardware» more  SAT 2010»
13 years 8 months ago
Exploiting Circuit Representations in QBF Solving
Previous work has shown that circuit representations can be exploited in QBF solvers to obtain useful performance improvements. In this paper we examine some additional techniques ...
Alexandra Goultiaeva, Fahiem Bacchus
ASPDAC
2010
ACM
143views Hardware» more  ASPDAC 2010»
13 years 8 months ago
A low latency wormhole router for asynchronous on-chip networks
Asynchronous on-chip networks are power efficient and tolerant to process variation but they are slower than synchronous on-chip networks. A low latency asynchronous wormhole route...
Wei Song, Doug Edwards
IACR
2011
192views more  IACR 2011»
12 years 9 months ago
The Hummingbird-2 Lightweight Authenticated Encryption Algorithm
Hummingbird-2 is an encryption algorithm with a 128-bit secret key and a 64-bit initialization vector. Hummingbird-2 optionally produces an authentication tag for each message proc...
Daniel Engels, Markku-Juhani O. Saarinen, Peter Sc...
FCCM
2007
IEEE
101views VLSI» more  FCCM 2007»
14 years 4 months ago
Mapping Real Time Operating System on Reconfigurable Instruction Cell Based Architectures
This paper presents the porting of an RTOS Micro C/OS-II on a novel reconfigurable instruction cell based architecture which fills the gap between DSP, FPGA and ASIC with high per...
Han Wei, Mark Muir, Ioannis Nousias, Tughrul Arsla...
ISCAS
2007
IEEE
84views Hardware» more  ISCAS 2007»
14 years 4 months ago
A Power-Optimized CMOS Quadrature VCO with Wide-Tuning Range for UWB Receivers
This paper presents a power-optimized quadrature VCO with wide-tuning range for UWB Receivers. The optimization of power is achieved by both optimum selection of LC tand and the im...
Zhujin Zhou, Ning Li, Wei Li, Junyan Ren