Proceedings of 9th Symposium on Computer Arithmetic
DOI: 10.1109/arith.1989.72831
|View full text |Cite
|
Sign up to set email alerts
|

Concurrent error detection in arithmetic and logical operations using Berger codes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
9
0

Publication Types

Select...
7
2
1

Relationship

1
9

Authors

Journals

citations
Cited by 25 publications
(9 citation statements)
references
References 8 publications
0
9
0
Order By: Relevance
“…In the field of IC security, widespread attention has been paid to the protection against fault injection attacks [5][6][7][8][9][10], resulting in multiple measures to prevent the ICs from being attacked by fault injection. The typical measures include physical protection [11], the hardware/time redundancy (module duplication/re-computation) method [12][13][14][15], and the error detection codes (EDC)-based technique [10,[16][17][18][19][20][21][22][23]. Among them, the EDC-based technique achieves the best tradeoff between fault coverage and hardware/time overheads [24].…”
Section: Introductionmentioning
confidence: 99%
“…In the field of IC security, widespread attention has been paid to the protection against fault injection attacks [5][6][7][8][9][10], resulting in multiple measures to prevent the ICs from being attacked by fault injection. The typical measures include physical protection [11], the hardware/time redundancy (module duplication/re-computation) method [12][13][14][15], and the error detection codes (EDC)-based technique [10,[16][17][18][19][20][21][22][23]. Among them, the EDC-based technique achieves the best tradeoff between fault coverage and hardware/time overheads [24].…”
Section: Introductionmentioning
confidence: 99%
“…To get away with permanent latent fault issue in one of the replicas, one must use N-Modular Redundancy (NMR) or other similar techniques [2], [4], [5] which have significant area overhead. To compensate for huge area overhead of concurrent NMR scheme, several encoding schemes have been proposed in the literature such as weight-based codes [6], Berger codes [7], Bose-Lin codes [8], etc. Even though, they are effective codes for detecting faults, they detect those faults that are excited and observed at the output.…”
Section: Introductionmentioning
confidence: 99%
“…Examples of information redundant codes frequently used are Residue Codes [3] and Parity checking [4], which can only detect single errors. Berger Code [5] provides a 100% coverage of all multiple bit errors, but can incur large area overheads when used in applications which require the detection of some, but not all, multiple bit errors. Dong's Code [6] however, permits the coverage of multiple bit errors to be tailored to a given application, thus minimising area overheads incurred.…”
Section: Introductionmentioning
confidence: 99%