p.file
213 subscribers
51 photos
7 videos
157 files
292 links
Please read the pinned post.

The group has restriction for links due to spam bots, but you can send it anyway.

@perplex_files
Download Telegram
multipliers can be implemented using wallace trees or dadda trees too, or a sequential circuit with shifters.
Forwarded from Sci-Hub
townsend2003.pdf
624.3 KB
Townsend, W. J., Swartzlander, Jr., E. E., & Abraham, J. A. (2003). A comparison of Dadda and Wallace multiplier delays. Advanced Signal Processing Algorithms, Architectures, and Implementations XIII. doi:10.1117/12.507012
p.file
#notes #comp_arch
#notes

MIPS datapath (no pipeline) for the j instruction. Since you have only 26 bits to represent an address, the processor takes the last 4 bits from the Program Counter + 4, the shift << 2 is used because PC is always a multiple of 4 (two last bits are always 0).
The Standard Performance Evaluation Corporation (SPEC) is a non-profit corporation formed to establish, maintain and endorse standardized benchmarks and tools to evaluate performance and energy efficiency for the newest generation of computing systems. SPEC develops benchmark suites and also reviews and publishes submitted results from our member organizations and other benchmark licensees.

https://www.spec.org/

https://www.spec.org/benchmarks.html#hpg
paper.pdf
967.9 KB
#crypto #hacking

Four Attacks and a Proof for Telegram.

DOI: 10.1109/SP46214.2022.9833666
microarchitecture-cheatsheet.pdf
1.4 MB
#roadmap #hardware #comp_arch

Microarchitecture Cheatsheet.

Check @p_pdfs for some arch manuals.
Forwarded from Lλmbda Reading Room (λ🐡)
Intel ME/AMD PSP Exploits Index
https://darkmentor.com/timeline.html