搜索结果: 1-15 共查到“processor”相关记录52条 . 查询时间(0.073 秒)
Accelerated V2X provisioning with Extensible Processor Platform
V2X SCMS Curve25519
font style='font-size:12px;'>
2019/9/19
With the burgeoning Vehicle-to-Everything (V2X) communication, security and privacy concerns are paramount. Such concerns are usually mitigated by combining cryptographic mechanisms with suitable key ...
Vulnerability Analysis of a Soft Core Processor through Fine-grain Power Profiling
Cryptography FPGA microprocessor
font style='font-size:12px;'>
2019/6/26
Embedded microprocessors are an important component of reconfigurable architectures. Fine-grain (e.g., cycle-accurate) power analysis of such processors has been used to improve power and energy effic...
华南理工大学计算机科学与工程学院计算机组成与体系结构课件Ch14 Superscalar Processor
华南理工大学计算机科学与工程学院 计算机组成与体系结构 课件 Ch14 Superscalar Processor
font style='font-size:12px;'>
2019/1/26
华南理工大学计算机科学与工程学院计算机组成与体系结构课件Ch14 Superscalar Processor。
An FPGA-based programmable processor for bilinear pairings
public-key cryptography implementation applications
font style='font-size:12px;'>
2018/11/2
Bilinear pairings on elliptic curves are an active research field in cryptography. First cryptographic protocols based on bilinear pairings were proposed by the year 2000 and they are promising soluti...
Secure Boot and Remote Attestation in the Sanctum Processor
secure boot remote attestation Physical Unclonable Function
font style='font-size:12px;'>
2018/5/11
During the secure boot process for a trusted execution environment, the processor must provide a chain of certificates to the remote client demonstrating that their secure container was established as...
Practical Evaluation of Masking Software Countermeasures on an IoT processor
IoT masking side channel attacks
font style='font-size:12px;'>
2017/5/11
Implementing cryptography on Internet-of-Things (IoT) devices, that is resilient against side channel analysis, has so far been a task only suitable for specialist software designers in interaction wi...
Biometric Based Network Security Using MIPS Cryptography Processor
Biometric Network Security Cryptograph
font style='font-size:12px;'>
2016/12/10
The empowerment in network on chip (NOC) and System on chip (SOC) in Microelectronics and Sensors have developed the various wireless communication Network technologies. In the past few years, many re...
Fast Modular Arithmetic on the Kalray MPPA-256 Processor for an Energy-Efficient Implementation of ECM
Kalray MPPA-256 manycore processor Multiprecision modular arithmetic Integer factorization
font style='font-size:12px;'>
2016/4/13
The Kalray MPPA-256 processor is based on a recent low-energy manycore architecture. In this article, we investigate its performance in multiprecision arithmetic for number-theoretic applications. We ...
A Variational Eigenvalue Solver on a Photonic Quantum Processor
Variational Eigenvalue Solver Photonic Quantum Processor
font style='font-size:12px;'>
2016/1/22
Quantum computers promise to efficiently solve important problems that are intractable on a conventional computer. For quantum systems, where the physical dimension grows expo-nentially, finding the e...
DEVELOPMENT OF EDUCATIONAL SAR PROCESSOR USING AJAX TECHNOLOGY
SAR Image Software Technology Education System
font style='font-size:12px;'>
2015/12/22
Processing techniques used for analyzing synthetic aperture radar (SAR) data have recently become more complicated, as new SAR sensors have included a variety of sensing functions. Understanding the S...
Cross Processor Cache Attacks
Invalidate+Transfer Cross-CPU attack HyperTransport
font style='font-size:12px;'>
2015/12/21
Multi-processor systems are becoming the de-facto standard
across different computing domains, ranging from high-end
multi-tenant cloud servers to low-power mobile platforms.
The denser integration...
An Application Specific Instruction Set Processor (ASIP) for the Niederreiter Cryptosystem
Cryptographic hardware and implementation Application Specific Instruction Set Processor Niederreiter cryptosystem
font style='font-size:12px;'>
2015/12/18
The Niederreiter public-key cryptosystem is based
on the security assumption that decoding generic linear binary
codes is NP complete, and therefore, is regarded as an alternative
post-quantum solu...
Temperature-aware processor frequency assignment for MPSoCs using convex optimization
Temperature-aware thermal MPSoCs convex optimization
font style='font-size:12px;'>
2015/8/10
The increasing processing capability of Multi-Processor Systems-on-Chips (MPSoCs) is leading to an increase in chip power dissipation, which in turn leads to significant increase in chip temperature. ...
Processor speed control with thermal constraints
Computer processors chips processors processor power function
font style='font-size:12px;'>
2015/8/7
We consider the problem of adjusting speeds of multiple computer processors sharing the same thermal environment, such as a chip or multi-chip package. We assume that the speed of processor (and assoc...
广东工业大学计算机学院操作系统英文课件Chapter8 Multiple Processor Systems
广东工业大学计算机学院 操作系统 英文 课件 Chapter8 Multiple Processor Systems
font style='font-size:12px;'>
2015/7/30
广东工业大学计算机学院操作系统英文课件Chapter8 Multiple Processor Systems。