B
Bruno Mussard
Researcher at Crocus Technology
Publications - 8
Citations - 71
Bruno Mussard is an academic researcher from Crocus Technology. The author has contributed to research in topics: Magnetoresistive random-access memory & Non-volatile random-access memory. The author has an hindex of 4, co-authored 8 publications receiving 64 citations. Previous affiliations of Bruno Mussard include STMicroelectronics.
Papers
More filters
Journal ArticleDOI
Exploring MRAM Technologies for Energy Efficient Systems-On-Chip
TL;DR: This paper describes an approach to obtain large, fine-grained exploration of how magnetic memory can be included in the memory hierarchy of processor-based systems by analyzing both performance and energy consumption.
Proceedings ArticleDOI
Emerging Non-volatile Memory Technologies Exploration Flow for Processor Architecture
TL;DR: This paper describes an evaluation flow to explore next generation of the memory hierarchy of processor-based systems using new non-volatile memory technologies, and magnetic RAM (MRAM) is a promising candidate to replace existing memories since it combinesnon-volatility, high scalability, high density, low latency, and low leakage.
Proceedings ArticleDOI
Exploration of Magnetic RAM Based Memory Hierarchy for Multicore Architecture
TL;DR: This paper demonstrates how current characteristics of MRAM can be used into memory hierarchy of multiprocessor chips (CMPs) and highlights the interest to use MRAM for cache memory in order to keep overall application performance saving static power.
Proceedings ArticleDOI
Potential applications based on NVM emerging technologies
Sophiane Senni,Raphael Martins Brum,Lionel Torres,Gilles Sassatelli,Abdoulaye Gamatié,Bruno Mussard +5 more
TL;DR: This paper explores use of MRAM into a memory hierarchy (from cache memory to register) of a processor-based system analyzing both performance and energy consumption.
Proceedings ArticleDOI
Implementation of AES Using NVM Memories Based on Comparison Function
TL;DR: A new secure AES implementation based on the MIP technology, which allows to protect the key in a secure environment to prevent attackers from retrieving it and also allows a very low silicon area implementation of AES.