top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Energy Efficient High Performance Processors : Recent Approaches for Designing Green High Performance Computing / / by Jawad Haj-Yahya, Avi Mendelson, Yosi Ben Asher, Anupam Chattopadhyay
Energy Efficient High Performance Processors : Recent Approaches for Designing Green High Performance Computing / / by Jawad Haj-Yahya, Avi Mendelson, Yosi Ben Asher, Anupam Chattopadhyay
Autore Haj-Yahya Jawad
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (xiv, 165 pages) : illustrations
Disciplina 004.35
Collana Computer Architecture and Design Methodologies
Soggetto topico Electronic circuits
Microprocessors
Circuits and Systems
Processor Architectures
Electronic Circuits and Devices
ISBN 981-10-8554-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- Background -- DOEE: Dynamic Optimization framework for better Energy Efficiency -- Fine-grain Power Breakdown of Modern Out-Of-Order Cores and its implications on Skylake based systems -- Compiler-Directed Power Management for Superscalars -- SEEM: Symbolic Execution for Energy Modeling -- Related Works -- Conclusions and Future Work.
Record Nr. UNINA-9910299905403321
Haj-Yahya Jawad  
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security, Privacy, and Applied Cryptography Engineering [[electronic resource] ] : 9th International Conference, SPACE 2019, Gandhinagar, India, December 3–7, 2019, Proceedings / / edited by Shivam Bhasin, Avi Mendelson, Mridul Nandi
Security, Privacy, and Applied Cryptography Engineering [[electronic resource] ] : 9th International Conference, SPACE 2019, Gandhinagar, India, December 3–7, 2019, Proceedings / / edited by Shivam Bhasin, Avi Mendelson, Mridul Nandi
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (X, 237 p. 106 illus., 42 illus. in color.)
Disciplina 005.82
Collana Theoretical Computer Science and General Issues
Soggetto topico Data protection
Software engineering
Computers
Computer engineering
Computer networks
Data and Information Security
Software Engineering
Computer Hardware
Computer Engineering and Networks
ISBN 3-030-35869-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Deployment of EMC-Compliant IC Chip Techniques in Design for Hardware Security -- Real Processing-in-Memory with Memristive Memory Processing Unit -- Length Preserving Symmetric Encryption: Is it Important? -- Towards Automatic Application of Side Channel Countermeasures -- Challenges in Deep Learning-based Profiled Side-channel Analysis -- A Study of Persistent Fault Analysis -- Internal state recovery attack on Stream Ciphers : Breaking BIVIUM -- Related-key Differential Cryptanalysis of Full Round CRAFT -- SpookChain: Chaining a Sponge-Based AEAD with Beyond-Birthday Security -- One trace is all it takes: Machine Learning-based Side-channel Attack on EdDSA -- An Efficient Practical Implementation of Impossible-Differentia Cryptanalysis for Five-Round AES-128 -- Automated Classification of Web-Application Attacks for Intrusion Detection -- Formal Analysis of PUF Instances Leveraging Correlation-Spectra in Boolean Functions -- ProTro: A Probabilistic Counter based Hardware Trojan Attack on FPGA based MACSec enabled Ethernet Switch -- Encrypted Classification Using Secure K-Nearest Neighbour Computation -- A Few Negative Results on Constructions of MDS Matrices Using Low XOR Matrices -- Revisiting the Security of LPN based RFID Authentication Protocol and Potential Exploits in Hardware Implementations.
Record Nr. UNISA-996466288103316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Security, Privacy, and Applied Cryptography Engineering : 9th International Conference, SPACE 2019, Gandhinagar, India, December 3–7, 2019, Proceedings / / edited by Shivam Bhasin, Avi Mendelson, Mridul Nandi
Security, Privacy, and Applied Cryptography Engineering : 9th International Conference, SPACE 2019, Gandhinagar, India, December 3–7, 2019, Proceedings / / edited by Shivam Bhasin, Avi Mendelson, Mridul Nandi
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (X, 237 p. 106 illus., 42 illus. in color.)
Disciplina 005.82
Collana Theoretical Computer Science and General Issues
Soggetto topico Data protection
Software engineering
Computers
Computer engineering
Computer networks
Data and Information Security
Software Engineering
Computer Hardware
Computer Engineering and Networks
ISBN 3-030-35869-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Deployment of EMC-Compliant IC Chip Techniques in Design for Hardware Security -- Real Processing-in-Memory with Memristive Memory Processing Unit -- Length Preserving Symmetric Encryption: Is it Important? -- Towards Automatic Application of Side Channel Countermeasures -- Challenges in Deep Learning-based Profiled Side-channel Analysis -- A Study of Persistent Fault Analysis -- Internal state recovery attack on Stream Ciphers : Breaking BIVIUM -- Related-key Differential Cryptanalysis of Full Round CRAFT -- SpookChain: Chaining a Sponge-Based AEAD with Beyond-Birthday Security -- One trace is all it takes: Machine Learning-based Side-channel Attack on EdDSA -- An Efficient Practical Implementation of Impossible-Differentia Cryptanalysis for Five-Round AES-128 -- Automated Classification of Web-Application Attacks for Intrusion Detection -- Formal Analysis of PUF Instances Leveraging Correlation-Spectra in Boolean Functions -- ProTro: A Probabilistic Counter based Hardware Trojan Attack on FPGA based MACSec enabled Ethernet Switch -- Encrypted Classification Using Secure K-Nearest Neighbour Computation -- A Few Negative Results on Constructions of MDS Matrices Using Low XOR Matrices -- Revisiting the Security of LPN based RFID Authentication Protocol and Potential Exploits in Hardware Implementations.
Record Nr. UNINA-9910357845403321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui