Sciweavers

2512 search results - page 453 / 503
» Software Transactional Memory
Sort
View
CTRSA
2010
Springer
152views Cryptology» more  CTRSA 2010»
13 years 11 months ago
Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs
This paper proposes a new type of cache-collision timing attacks on software implementations of AES. Our major technique is of differential nature and is based on the internal cryp...
Andrey Bogdanov, Thomas Eisenbarth, Christof Paar,...
AIPS
2007
13 years 10 months ago
An Innovative Product for Space Mission Planning: An A Posteriori Evaluation
This paper describes MEXAR2, a software tool that is currently used to synthesize the operational commands for data downlink from the on-board memory of an interplanetary space mi...
Amedeo Cesta, Gabriella Cortellessa, Simone Fratin...
AICT
2008
IEEE
13 years 9 months ago
Towards Efficient Service Placement and Server Selection for Large-Scale Deployments
Currently many service providers offer their services using a private and proprietary hard- and software infrastructure. These infrastructures often share many similarities. Hence...
Jeroen Famaey, Tim Wauters, Filip De Turck, Bart D...
ARC
2008
Springer
112views Hardware» more  ARC 2008»
13 years 9 months ago
Optimal Unroll Factor for Reconfigurable Architectures
Abstract. Loops are an important source of optimization. In this paper, we address such optimizations for those cases when loops contain kernels mapped on reconfigurable fabric. We...
Ozana Silvia Dragomir, Elena Moscu Panainte, Koen ...
CHES
2008
Springer
132views Cryptology» more  CHES 2008»
13 years 9 months ago
Light-Weight Instruction Set Extensions for Bit-Sliced Cryptography
Bit-slicing is a non-conventional implementation technique for cryptographic software where an n-bit processor is considered as a collection of n 1-bit execution units operating in...
Philipp Grabher, Johann Großschädl, Dan...