메뉴 건너뛰기




Volumn 2002-January, Issue , 2002, Pages 286-295

Instruction stream mutation for non-deterministic processors

Author keywords

Computer science; Computer security; Costs; Cryptography; Genetic mutations; Hardware; Pipelines; Power measurement; Registers; Runtime

Indexed keywords

ALGORITHMS; COMPUTER ARCHITECTURE; COMPUTER HARDWARE; COMPUTER SCIENCE; COSTS; CRYPTOGRAPHY; ELECTRIC POWER MEASUREMENT; HARDWARE; HARDWARE SECURITY; PIPELINES; SECURITY OF DATA; SIDE CHANNEL ATTACK; SMART CARDS;

EID: 84948778220     PISSN: 10636862     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ASAP.2002.1030727     Document Type: Conference Paper
Times cited : (36)

References (19)
  • 13
  • 16
    • 0343388807 scopus 로고    scopus 로고
    • Technical report, Department of Computer Science, The University of Arizona, December
    • R. Muth. Register Liveness Analysis of Executable Code. Technical report, Department of Computer Science, The University of Arizona, December 1998.
    • (1998) Register Liveness Analysis of Executable Code
    • Muth, R.1
  • 17
    • 84948839766 scopus 로고    scopus 로고
    • Link Time Optimization with Translation to Intermediate Program and Following Optimization Techniques Including Program Analysis Code Motion Live Variable Set Generation Order Analysis, Dead Code Elimination and Load Invariant Analysis
    • December
    • A. Srivastava. Link Time Optimization with Translation to Intermediate Program and Following Optimization Techniques Including Program Analysis Code Motion Live Variable Set Generation Order Analysis, Dead Code Elimination and Load Invariant Analysis. Patent US5966539 http://l2.espacenet.com/dips/viewer?PN=US5966539&CY=gb&LG=en&%DB=EPD, December 1999.
    • (1999)
    • Srivastava, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.