scispace - formally typeset
B

Bruno Mussard

Researcher at Crocus Technology

Publications -  8
Citations -  71

Bruno Mussard is an academic researcher from Crocus Technology. The author has contributed to research in topics: Magnetoresistive random-access memory & Non-volatile random-access memory. The author has an hindex of 4, co-authored 8 publications receiving 64 citations. Previous affiliations of Bruno Mussard include STMicroelectronics.

Papers
More filters
Journal ArticleDOI

Exploring MRAM Technologies for Energy Efficient Systems-On-Chip

TL;DR: This paper describes an approach to obtain large, fine-grained exploration of how magnetic memory can be included in the memory hierarchy of processor-based systems by analyzing both performance and energy consumption.
Proceedings ArticleDOI

Emerging Non-volatile Memory Technologies Exploration Flow for Processor Architecture

TL;DR: This paper describes an evaluation flow to explore next generation of the memory hierarchy of processor-based systems using new non-volatile memory technologies, and magnetic RAM (MRAM) is a promising candidate to replace existing memories since it combinesnon-volatility, high scalability, high density, low latency, and low leakage.
Proceedings ArticleDOI

Exploration of Magnetic RAM Based Memory Hierarchy for Multicore Architecture

TL;DR: This paper demonstrates how current characteristics of MRAM can be used into memory hierarchy of multiprocessor chips (CMPs) and highlights the interest to use MRAM for cache memory in order to keep overall application performance saving static power.
Proceedings ArticleDOI

Potential applications based on NVM emerging technologies

TL;DR: This paper explores use of MRAM into a memory hierarchy (from cache memory to register) of a processor-based system analyzing both performance and energy consumption.
Proceedings ArticleDOI

Implementation of AES Using NVM Memories Based on Comparison Function

TL;DR: A new secure AES implementation based on the MIP technology, which allows to protect the key in a secure environment to prevent attackers from retrieving it and also allows a very low silicon area implementation of AES.