Sciweavers

66 search results - page 12 / 14
» ae 2005
Sort
View
DATE
2005
IEEE
109views Hardware» more  DATE 2005»
14 years 3 months ago
ISEGEN: Generation of High-Quality Instruction Set Extensions by Iterative Improvement
Customization of processor architectures through Instruction Set Extensions (ISEs) is an effective way to meet the growing performance demands of embedded applications. A high-qua...
Partha Biswas, Sudarshan Banerjee, Nikil D. Dutt, ...
DATE
2005
IEEE
82views Hardware» more  DATE 2005»
14 years 3 months ago
Energy-Aware Routing for E-Textile Applications
As the scale of electronic devices shrinks, “electronic textiles” (e-textiles) will make possible a wide variety of novel applications which are currently unfeasible. Due to t...
Jung-Chun Kao, Radu Marculescu
IPPS
2005
IEEE
14 years 3 months ago
IPSec Implementation on Xilinx Virtex-II Pro FPGA and Its Application
In this paper, we propose an IPSec implementation on Xilinx Virtex-II Pro FPGA1 . We move the key management and negotiation into software function calls that run on the PowerPC p...
Jing Lu, John W. Lockwood
PEWASUN
2005
ACM
14 years 3 months ago
Application of synchronous dynamic encryption system (SDES) in wireless sensor networks
Inherent to the wireless sensor networks are the two major problems of the broadcasting vulnerability, the limited computational capability and power budget. Even though security ...
Hamdy S. Soliman, Mohammed Omari
CHES
2005
Springer
87views Cryptology» more  CHES 2005»
14 years 3 months ago
Templates as Master Keys
We introduce two new attacks: the single-bit template attack and the template-enhanced DPA attack. The single-bit template attack can be used very effectively to classify even sin...
Dakshi Agrawal, Josyula R. Rao, Pankaj Rohatgi, Ka...