We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 3,590 results
  1. A Side-Channel Based Disassembler for the ARM-Cortex M0

    The most common application for side-channel attacks is the extraction of secret information, such as key material, from the implementation of a...
    Jurian van Geest, Ileana Buhan in Applied Cryptography and Network Security Workshops
    Conference paper 2022
  2. ARM Architecture and Programming

    This chapter covers the ARM architecture, ARM instructions, ARM programming, and development of programs for execution on ARM virtual machines. These...
    Chapter 2023
  3. Performance–energy trade-offs of deep learning convolution algorithms on ARM processors

    In this work, we assess the performance and energy efficiency of high-performance codes for the convolution operator, based on the direct,...

    Manuel F. Dolz, Sergio Barrachina, ... Andrés E. Tomás in The Journal of Supercomputing
    Article Open access 21 January 2023
  4. Benchmarking and Analysing the NIST PQC Lattice-Based Signature Schemes Standards on the ARM Cortex M7

    This paper presents an analysis of the two lattice-based digital signature schemes, Dilithium and Falcon, which have been chosen by NIST for...
    James Howe, Bas Westerbaan in Progress in Cryptology - AFRICACRYPT 2023
    Conference paper 2023
  5. ARM TrustZone and Secure Operating Systems

    This chapter covers ARM TrustZone technology and secure operating systems. It first describes the ARM TrustZone technology as a security extension in...
    Chapter 2023
  6. Comprehensive analysis of energy efficiency and performance of ARM and RISC-V SoCs

    Over the past few years, ARM has been the dominant player in embedded systems and System-on-Chips (SoCs). With the emergence of hardware platforms...

    Daniel Suárez, Francisco Almeida, Vicente Blanco in The Journal of Supercomputing
    Article Open access 20 February 2024
  7. A comprehensive sensorimotor control model emulating neural activities for planar human arm reaching movements

    Functional Electrical Stimulation (FES) has demonstrated potential in clinical applications, but determining the optimal electrical current to...

    Yongkun Zhao, Mingquan Zhang, ... Masahiro Todoh in Applied Intelligence
    Article 07 February 2024
  8. A Sub-Riemannian Model of the Functional Architecture of M1 for Arm Movement Direction

    In this paper we propose a neurogeometrical model of the behaviour of cells of the arm area of the primary motor cortex (M1). We mathematically...
    Caterina Mazzetti, Alessandro Sarti, Giovanna Citti in Geometric Science of Information
    Conference paper 2023
  9. ARMing-Sword: Scabbard on ARM

    Scabbard, one of the Post-quantum Key Encapsulation Mechanisms (KEM), is a improved version of Saber that Lattice-based Key Encapsulation Mechanism....
    Hyeokdong Kwon, Hyunjun Kim, ... Hwajeong Seo in Information Security Applications
    Conference paper 2023
  10. Kyber on ARM64: Compact Implementations of Kyber on 64-Bit ARM Cortex-A Processors

    Public-key cryptography based on the lattice problem is efficient and believed to be secure in a post-quantum era. In this paper, we introduce...
    Pakize Sanal, Emrah Karagoz, ... Mehran Mozaffari-Kermani in Security and Privacy in Communication Networks
    Conference paper 2021
  11. Automatic generation of ARM NEON micro-kernels for matrix multiplication

    General matrix multiplication ( gemm ) is a fundamental kernel in scientific computing and current frameworks for deep learning. Modern realisations of gemm...

    Guillermo Alaejos, Héctor Martínez, ... Enrique S. Quintana-Ortí in The Journal of Supercomputing
    Article Open access 12 March 2024
  12. SABER post-quantum key encapsulation mechanism (KEM): evaluating performance in ARM and x64 architectures

    SABER is one of the four finalists in the third round of the ongoing NIST post-quantum cryptography standardization process. It is one of the three...

    Leonardo A. D. S. Ribeiro, José Paulo da Silva Lima, ... André L. M. Santos in Journal of Cryptographic Engineering
    Article 16 October 2023
  13. Virtual Model of a Robotic Arm Digital Twin with MuJoCo

    In this paper, a digital twin architecture for a Robotis manipulator’s arm is constructed on the Mujoco physics engine SDK. The virtual model in the...
    Bernardo Perez Inturias, João Pedro Garbelini Marques de Oliveira, Mauricio Becerra Vargas in Robotics, Computer Vision and Intelligent Systems
    Conference paper 2024
  14. Side-channel analysis against ANSSI’s protected AES implementation on ARM: end-to-end attacks with multi-task learning

    In 2019, ANSSI released a protected software implementation of AES running on an STM32 platform with ARM Cortex-M architecture, publicly available on...

    Loïc Masure, Rémi Strullu in Journal of Cryptographic Engineering
    Article 10 March 2023
  15. Curve448 on 32-Bit ARM Cortex-M4

    Public key cryptography is widely used in key exchange and digital signature protocols. Public key cryptography requires expensive primitive...
    Hwajeong Seo, Reza Azarderakhsh in Information Security and Cryptology – ICISC 2020
    Conference paper 2021
  16. Understanding Computer Organization A Guide to Principles Across RISC-V, ARM Cortex, and Intel Architectures

    This textbook unlocks modern computer organizations' secrets, with real-world examples from RISC-V, ARM, and Intel-based computer systems. The guide...

    Textbook 2024
  17. Implementing Lattice-Based PQC on Resource-Constrained Processors:

    This paper studies the implementation of the lattice-based PQC on the 32-bit constrained processors that only have constrained multiplication...
    Lu Li, Mingqiang Wang, Weijia Wang in Progress in Cryptology – INDOCRYPT 2023
    Conference paper 2024
  18. Performance Evaluation of Raspberry Pi 4B Microcomputer: Case Studies on MPICH Cluster, VMware ES** ARM Fling, and Windows 11 ARM OS

    The performance of the Raspberry Pi 4B computer was evaluated for three cases. First, a Raspberry Pi heterogeneous MPICH cluster with weight-based...
    Conference paper 2022
  19. No Silver Bullet: Optimized Montgomery Multiplication on Various 64-Bit ARM Platforms

    In this paper, we firstly presented optimized implementations of Montgomery multiplication on 64-bit ARM processors by taking advantages of Karatsuba...
    Hwajeong Seo, Pakize Sanal, ... Reza Azarderakhsh in Information Security Applications
    Conference paper 2021
  20. Augmented Reality for Real-Time Control of a Robotic Arm with IoT Connection

    Augmented Reality (AR) is one of the most important technologies that takes part in the Fourth Industrial Revolution, and for this reason, this...
    Gabriel Montenegro, Johanna Salvador, Gustavo Caiza in Doctoral Symposium on Information and Communication Technologies
    Conference paper 2022
Did you find what you were looking for? Share feedback.