Shan Chien Fang

Learn More
Cryptographic embedded systems are vulnerable to Differential Power Analysis (DPA) attacks. In this paper, we propose a logic design style, called as Precharge Masked Reed-Muller Logic (PMRML) to overcome the glitch and Dissipation Timing Skew (DTS) problems in design of DPA-resistant cryptographic hardware. Both problems can significantly reduce the(More)
In order to achieve the interoperability of heterogeneous database systems, a semantics-preserving translation of the modeling constructs and constraints captured by different data models and defined in different schemata is a necessity. It is difficult to translate the constructs and constraints of one model directly into those of another model because 1)(More)
The allocation of device variables on I/O registers affects the code size and performance of an I/O device driver. This work seeks the allocation with the minimal software or hardware cost in a hardware/software codesign environment. The problems of exact minimization under constraints are formulated as zero-one integer linear programming problems.(More)
  • 1