16 papers:
- SAC-2015-GouthamLY #authentication #protocol #smarttech #using
- An anonymous ID-based remote mutual authentication with key agreement protocol on ECC using smart cards (RAG, GJL, KYY), pp. 169–174.
- HPCA-2015-KimSE #flexibility #memory management #reliability
- Bamboo ECC: Strong, safe, and flexible codes for reliable computer memory (JK, MS, ME), pp. 101–112.
- DAC-2014-ClercqUHV #implementation #power management
- Ultra Low-Power implementation of ECC on the ARM Cortex-M0+ (RdC, LU, AVH, IV), p. 6.
- DAC-2014-RoyMIT #multi #performance
- Tile Before Multiplication: An Efficient Strategy to Optimize DSP Multiplier for Accelerating Prime Field ECC for NIST Curves (DBR, DM, MI, JT), p. 6.
- SAC-2014-YoonY #authentication #network #using
- A biometric-based authenticated key agreement scheme using ECC for wireless sensor networks (EJY, KYY), pp. 699–705.
- DATE-2011-KaraklajicFSV #detection #fault #low cost #using
- Low-cost fault detection method for ECC using Montgomery powering ladder (DK, JF, JMS, IV), pp. 1016–1021.
- DATE-2011-MaW #detection #fault #low cost #named
- LOEDAR: A low cost error detection and recovery scheme for ECC (KM, KW), pp. 1010–1015.
- DATE-2011-NicolaidisBZ
- Eliminating speed penalty in ECC protected memories (MN, TB, NEZ), pp. 1614–1619.
- DATE-2010-IzumiISO #multi
- Improved countermeasure against Address-bit DPA for ECC scalar multiplication (MI, JI, KS, KO), pp. 981–984.
- ASPLOS-2010-YoonE #flexibility #in memory #memory management
- Virtualized and flexible ECC for main memory (DHY, ME), pp. 397–408.
- DATE-2009-GuoS #bound #design #distributed #optimisation #using
- Optimizing the HW/SW boundary of an ECC SoC design using control hierarchy and distributed storage (XG, PS), pp. 454–459.
- DAC-2006-StojanovicBDW #effectiveness #implementation #queue
- A cost-effective implementation of an ECC-protected instruction queue for out-of-order microprocessors (VS, RIB, JD, RW), pp. 705–708.
- PEPM-2006-LeuschelEVCF #interface #web
- The Ecce and Logen partial evaluators and their web interfaces (ML, DE, MV, SJC, MF), pp. 88–94.
- HPCA-2005-QinLZ #detection #memory management #named
- SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs (FQ, SL, YZ), pp. 291–302.
- LOPSTR-2003-LehmannL #generative #induction #proving #theorem proving #using
- Inductive Theorem Proving by Program Specialisation: Generating Proofs for Isabelle Using Ecce (HL, ML), pp. 1–19.
- LICS-1989-Luo #calculus
- ECC, an Extended Calculus of Constructions (ZL), pp. 386–395.