16 papers:
SAC-2015-GouthamLY #authentication #protocol #smarttech #using- An anonymous ID-based remote mutual authentication with key agreement protocol on ECC using smart cards (RAG, GJL, KYY), pp. 169–174.
HPCA-2015-KimSE #flexibility #memory management #reliability- Bamboo ECC: Strong, safe, and flexible codes for reliable computer memory (JK, MS, ME), pp. 101–112.
DAC-2014-ClercqUHV #implementation #power management- Ultra Low-Power implementation of ECC on the ARM Cortex-M0+ (RdC, LU, AVH, IV), p. 6.
DAC-2014-RoyMIT #multi #performance- Tile Before Multiplication: An Efficient Strategy to Optimize DSP Multiplier for Accelerating Prime Field ECC for NIST Curves (DBR, DM, MI, JT), p. 6.
SAC-2014-YoonY #authentication #network #using- A biometric-based authenticated key agreement scheme using ECC for wireless sensor networks (EJY, KYY), pp. 699–705.
DATE-2011-KaraklajicFSV #detection #fault #low cost #using- Low-cost fault detection method for ECC using Montgomery powering ladder (DK, JF, JMS, IV), pp. 1016–1021.
DATE-2011-MaW #detection #fault #low cost #named- LOEDAR: A low cost error detection and recovery scheme for ECC (KM, KW), pp. 1010–1015.
DATE-2011-NicolaidisBZ- Eliminating speed penalty in ECC protected memories (MN, TB, NEZ), pp. 1614–1619.
DATE-2010-IzumiISO #multi- Improved countermeasure against Address-bit DPA for ECC scalar multiplication (MI, JI, KS, KO), pp. 981–984.
ASPLOS-2010-YoonE #flexibility #in memory #memory management- Virtualized and flexible ECC for main memory (DHY, ME), pp. 397–408.
DATE-2009-GuoS #bound #design #distributed #optimisation #using- Optimizing the HW/SW boundary of an ECC SoC design using control hierarchy and distributed storage (XG, PS), pp. 454–459.
DAC-2006-StojanovicBDW #effectiveness #implementation #queue- A cost-effective implementation of an ECC-protected instruction queue for out-of-order microprocessors (VS, RIB, JD, RW), pp. 705–708.
PEPM-2006-LeuschelEVCF #interface #web- The Ecce and Logen partial evaluators and their web interfaces (ML, DE, MV, SJC, MF), pp. 88–94.
HPCA-2005-QinLZ #detection #memory management #named- SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs (FQ, SL, YZ), pp. 291–302.
LOPSTR-2003-LehmannL #generative #induction #proving #theorem proving #using- Inductive Theorem Proving by Program Specialisation: Generating Proofs for Isabelle Using Ecce (HL, ML), pp. 1–19.
LICS-1989-Luo #calculus- ECC, an Extended Calculus of Constructions (ZL), pp. 386–395.