Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
MICROW
MICROW 2012
Generate Citations
2012 45th Annual IEEE/ACM International Symposium on Microarchitecture Workshops (MICROW)
Dec. 1 2012 to Dec. 5 2012
Vancouver, BC
Table of Contents
Papers
[Title page i]
Freely available from IEEE.
pp. i
Papers
[Title page iii]
Freely available from IEEE.
pp. iii
Papers
[Copyright notice]
Freely available from IEEE.
pp. iv
Papers
Table of contents
Freely available from IEEE.
pp. v-vi
Message from HASP 2012 Organizers
Freely available from IEEE.
pp. vii-vii
by
Weidong Shi
,
Ruby Lee
Papers
HASP 2012 Workshop Organizers
Freely available from IEEE.
pp. viii
Papers
HASP 2012 Program Committee
Freely available from IEEE.
pp. ix
Papers
HASP 2012 Reviewers
Freely available from IEEE.
pp. x
Papers
WNTC 2012 Introduction
Freely available from IEEE.
pp. xi
Papers
From Cryptography to Hardware: Analyzing Embedded Xilinx BRAM for Cryptographic Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Shivam Bhasin
,
Sylvain Guilley
,
Jean-Luc Danger
Papers
Power analysis of hardware implementations protected with secret sharing
Full-text access may be available. Sign in or learn about subscription options.
pp. 9-16
by
Guido Bertoni
,
Joan Daemen
,
Nicolas Debande
,
Thanh-Ha Le
,
Michael Peeters
,
Gilles Van Assche
Papers
Hardware Prefetchers Leak: A Revisit of SVF for Cache-Timing Attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 17-23
by
Sarani Bhattacharya
,
Chester Rebeiro
,
Debdeep Mukhopadhyay
PHAP: Password based Hardware Authentication using PUFs
Full-text access may be available. Sign in or learn about subscription options.
pp. 24-31
by
Raghavan Kumar
,
Wayne Burleson
Papers
Wavelet transform based pre-processing for side channel analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 32-38
by
Nicolas Debande
,
Youssef Souissi
,
M. Abdelaziz El Aabid
,
Sylvain Guilley
,
Jean-Luc Danger
Papers
An 8-bit AVR-Based Elliptic Curve Cryptographic RISC Processor for the Internet of Things
Full-text access may be available. Sign in or learn about subscription options.
pp. 39-46
by
Erich Wenger
,
Johann Grossschadl
Papers
Security verification of hardware-enabled attestation protocols
Full-text access may be available. Sign in or learn about subscription options.
pp. 47-54
by
Tianwei Zhang
,
Jakub Szefer
,
Ruby B. Lee
Continuous Remote Mobile Identity Management Using Biometric Integrated Touch-Display
Full-text access may be available. Sign in or learn about subscription options.
pp. 55-62
by
Tao Feng
,
Ziyi Liu
,
Bogdan Carbunar
,
Dainis Boumber
,
Weidong Shi
Papers
Dynamic acceleration of multithreaded program critical paths in near-threshold systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 63-67
by
Hyoun Kyu Cho
,
Scott Mahlke
Papers
Low-Latency Mechanisms for Near-Threshold Operation of Private Caches in Shared Memory Multicores
Full-text access may be available. Sign in or learn about subscription options.
pp. 68-73
by
Farrukh Hijaz
,
Qingchuan Shi
,
Omer Khan
Papers
Performance and Power Solutions for Caches Using 8T SRAM Cells
Full-text access may be available. Sign in or learn about subscription options.
pp. 74-80
by
Mostafa Farahani
,
Amirali Baniasadi
Papers
Author index
Freely available from IEEE.
pp. 81
Papers
[Publisher's information]
Freely available from IEEE.
pp. 82
Showing 22 out of 22