搜索结果: 1-15 共查到“知识库 计算机处理器技术”相关记录251条 . 查询时间(3.52 秒)
Realm: An Event-Based Low-Level Runtime for Distributed Memory Architectures
Realm Legion distributed memory deferred execution events reservations heterogeneous architectures runtime
font style='font-size:12px;'>
2016/5/24
We present Realm, an event-based runtime system for heterogeneous,distributed memory machines. Realm is fully asynchronous: all runtime actions are non-blocking. Realm supports spawning computations, ...
Temperature-aware processor frequency assignment for MPSoCs using convex optimization
Temperature-aware thermal MPSoCs convex optimization
font style='font-size:12px;'>
2015/8/10
The increasing processing capability of Multi-Processor Systems-on-Chips (MPSoCs) is leading to an increase in chip power dissipation, which in turn leads to significant increase in chip temperature. ...
Processor speed control with thermal constraints
Computer processors chips processors processor power function
font style='font-size:12px;'>
2015/8/7
We consider the problem of adjusting speeds of multiple computer processors sharing the same thermal environment, such as a chip or multi-chip package. We assume that the speed of processor (and assoc...
A Method for Fast Revocation of Public Key Certificates and Security Capabilities
Public Key Certificate Security Capabilities
font style='font-size:12px;'>
2015/8/5
We present a new approach to fast certificate revocation centered around the concept of an on-line semi-trusted mediator (SEM). The use of a SEM in conjunction with a simple threshold variant of the R...
Short Signatures Without Random Oracles
Random Oracles Short Signatures
font style='font-size:12px;'>
2015/8/5
We describe a short signature scheme which is existentially unforgeable under a chosen message attack without using random oracles. The security of our scheme depends on a new complexity assumption we...
Remote timing attacks are practical
practical timing attacks
font style='font-size:12px;'>
2015/8/5
Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing attacks apply to general software systems. Specifically, we devise a timing attack against Open...
Attacking an obfuscated cipher by injecting faults
injecting faul obfuscated cipher
font style='font-size:12px;'>
2015/8/5
We study the strength of certain obfuscation techniques used to protect software from reverse engineering and tampering. We show that some common obfuscation methods can be defeated using a fault inje...
Protecting Browser State from Web Privacy Attacks
Web Privacy Attacks Browser State
font style='font-size:12px;'>
2015/8/5
We construct a fully collusion resistant tracing traitors system with sublinear size ciphertexts and constant size private keys. More precisely, let N be the total number of users. Our system generate...
Strongly Unforgeable Signatures Based on Computational Diffie-Hellman
Computational Diffie-Hellman Unforgeable Signatures
font style='font-size:12px;'>
2015/8/5
A signature system is said to be strongly unforgeable if the signature is existentially unforgeable and, given signatures on some message M, the adversary cannot produce a new signature on M. Strongly...
Chosen-Ciphertext Security from Identity-Based Encryption
Identity-Based Encryption Chosen-Ciphertext Security
font style='font-size:12px;'>
2015/8/5
We propose simple and efficient "CCA-secure" public-key encryption schemes (i.e., schemes secure against adaptive chosen-ciphertext attacks) based on any identity-based encryption (IBE) scheme. When i...
Evaluating 2-DNF Formulas on Ciphertexts
Ciphertexts 2-DNF Formulas
font style='font-size:12px;'>
2015/8/5
Let F be a 2-DNF formula on boolean variables x1,...,xn. We present a homomorphic public key encryption system that allows the public evaluation of F given an encryption of the variables x1,...,xn. In...
Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity Based Encryption
Cryptosystems Built Identity Based Encryption
font style='font-size:12px;'>
2015/8/5
Recently, Canetti, Halevi, and Katz showed a general method for constructing CCA-secure encryption from identity-based encryption in the standard model. We improve the efficiency of their construction...
Group Signatures with Verifier-Local Revocation
Verifier-Local Revocation signature verifiers
font style='font-size:12px;'>
2015/8/5
Group signatures have recently become important for enabling privacy-preserving attestation in projects such as Microsoft's {\sc ngscb} effort (formerly Palladium). Revocation is critical to the secur...
On the Effectiveness of Address-Space Randomization
Address-Space Randomization running code
font style='font-size:12px;'>
2015/8/5
Address-space randomization is a technique used to fortify systems against buffer overflow attacks. The idea is to introduce artificial diversity by randomizing the memory location of certain system c...