A Custom Accelerator for Homomorphic Encryption Applications
After the introduction of first fully homomorphic encryption scheme in 2009, numerous research work has been published aiming at making fully homomorphic encryption practical for daily use. The first fully functional scheme and a few others that have ...
Adaptive Scheduling of Task Graphs with Dynamic Resilience
This paper studies a scheduling problem of task graphs on a non-dedicated networked computing platform. The networked platform is characterized by a set of fully connected processors such as a multiprocessor system that can be shared by multiple tasks. ...
An Analytical Model for Coding-Based Reprogramming Protocols in Lossy Wireless Sensor Networks
Multi-hop over-the-air reprogramming is essential for remote installation of software patches and upgrades in wireless sensor networks (WSNs). Several recent coding-based reprogramming protocols have been proposed to enable efficient code dissemination ...
An On-Chip Error Detection Method to Reduce the Post-Silicon Debug Time
Debug time has become a major issue in post silicon debug because of the increasingly complicated nature of circuit design. However, reducing debug time is a major challenge because of the limited size of the trace buffer used to observe internal ...
A SISO Register Circuit Tailored for Input Data with Low Transition Probability
The paper proposes a SISO register circuit, functionally equivalent to a Shift Register, that is the optimal design choice when the input data have a reduced transition probability. The proposed circuit obtains improved performances by only storing the ...
Beyond the Roofline: Cache-Aware Power and Energy-Efficiency Modeling for Multi-Cores
To foster the energy-efficiency in current and future multi-core processors, the benefits and trade-offs of a large set of optimization solutions must be evaluated. For this purpose, it is often crucial to consider how key micro-architecture aspects, ...
Construction of Rotation Symmetric S-Boxes with High Nonlinearity and Improved DPA Resistivity
In this paper, we provide an $n\times n$ bijective rotation symmetric S-box (RSSB) construction with improved resistance to differential power analysis (DPA) using rotation-symmetric Boolean functions (RSBFs). The RSSB class is generated from an ...
DaDianNao: A Neural Network Supercomputer
Many companies are deploying services largely based on machine-learning algorithms for sophisticated processing of large amounts of data, either for consumers or industry. The state-of-the-art and most popular such machine-learning algorithms are ...
Hierarchical Multipartite Function Evaluation
Function evaluation is an important arithmetic computation in many signal processing applications, such as special function units in modern graphics processing units (GPUs). Hardware implementations of function evaluation usually consists of lookup ...
Latch-Based Structure: A High Resolution and Self-Reference Technique for Hardware Trojan Detection
Hardware Trojan detection has been the subject of many studies in the realm of hardware security in the recent years. The effectiveness of current techniques proposed for Trojan detection is limited by some factors, process variation noise being a major ...
Multi-Inherited Search Tree for Dynamic IP Router-Tables
IP lookup and routing table update affect the speed at which a router forwards packets. This study proposes a new data structure for dynamic router tables used in IP lookup and update, called the Multi-inherited Search Tree (MIST). Partitioning each ...
Short Code: An Efficient RAID-6 MDS Code for Optimizing Degraded Reads and Partial Stripe Writes
As reliability requirements are increasingly important in both clusters and data centers, RAID-6, which can tolerate any two concurrent disk failures, has been widely used in modern storage systems. However, most existing RAID-6 codes cannot provide ...
The Repetitive Turn Model for Adaptive Routing
For 2D mesh based Network-on-Chip (NoC), the prohibited turns of routing algorithms should be repetitively distributed in order for the routing algorithms to be implemented by logic-based circuit. In this paper, we aim to exploit the designing space for ...
Thermal Safe Power (TSP): Efficient Power Budgeting for Heterogeneous Manycore Systems in Dark Silicon
Chip manufacturers provide the Thermal Design Power (TDP) for a specific chip. The cooling solution is designed to dissipate this power level. But because TDP is not necessarily the maximum power that can be applied, chips are operated with Dynamic ...
Towards an Energy-Efficient Anomaly-Based Intrusion Detection Engine for Embedded Systems
Nowadays, a significant part of all network accesses comes from embedded and battery-powered devices, which must be energy efficient. This paper demonstrates that a hardware (HW) implementation of network security algorithms can significantly reduce ...