Search
Search Results
-
A Side-Channel Based Disassembler for the ARM-Cortex M0
The most common application for side-channel attacks is the extraction of secret information, such as key material, from the implementation of a... -
ARM Architecture and Programming
This chapter covers the ARM architecture, ARM instructions, ARM programming, and development of programs for execution on ARM virtual machines. These... -
Performance–energy trade-offs of deep learning convolution algorithms on ARM processors
In this work, we assess the performance and energy efficiency of high-performance codes for the convolution operator, based on the direct,...
-
Benchmarking and Analysing the NIST PQC Lattice-Based Signature Schemes Standards on the ARM Cortex M7
This paper presents an analysis of the two lattice-based digital signature schemes, Dilithium and Falcon, which have been chosen by NIST for... -
ARM TrustZone and Secure Operating Systems
This chapter covers ARM TrustZone technology and secure operating systems. It first describes the ARM TrustZone technology as a security extension in... -
Comprehensive analysis of energy efficiency and performance of ARM and RISC-V SoCs
Over the past few years, ARM has been the dominant player in embedded systems and System-on-Chips (SoCs). With the emergence of hardware platforms...
-
A comprehensive sensorimotor control model emulating neural activities for planar human arm reaching movements
Functional Electrical Stimulation (FES) has demonstrated potential in clinical applications, but determining the optimal electrical current to...
-
A Sub-Riemannian Model of the Functional Architecture of M1 for Arm Movement Direction
In this paper we propose a neurogeometrical model of the behaviour of cells of the arm area of the primary motor cortex (M1). We mathematically... -
ARMing-Sword: Scabbard on ARM
Scabbard, one of the Post-quantum Key Encapsulation Mechanisms (KEM), is a improved version of Saber that Lattice-based Key Encapsulation Mechanism.... -
Kyber on ARM64: Compact Implementations of Kyber on 64-Bit ARM Cortex-A Processors
Public-key cryptography based on the lattice problem is efficient and believed to be secure in a post-quantum era. In this paper, we introduce... -
Automatic generation of ARM NEON micro-kernels for matrix multiplication
General matrix multiplication ( gemm ) is a fundamental kernel in scientific computing and current frameworks for deep learning. Modern realisations of gemm...
-
SABER post-quantum key encapsulation mechanism (KEM): evaluating performance in ARM and x64 architectures
SABER is one of the four finalists in the third round of the ongoing NIST post-quantum cryptography standardization process. It is one of the three...
-
Virtual Model of a Robotic Arm Digital Twin with MuJoCo
In this paper, a digital twin architecture for a Robotis manipulator’s arm is constructed on the Mujoco physics engine SDK. The virtual model in the... -
Side-channel analysis against ANSSI’s protected AES implementation on ARM: end-to-end attacks with multi-task learning
In 2019, ANSSI released a protected software implementation of AES running on an STM32 platform with ARM Cortex-M architecture, publicly available on...
-
Curve448 on 32-Bit ARM Cortex-M4
Public key cryptography is widely used in key exchange and digital signature protocols. Public key cryptography requires expensive primitive... -
Understanding Computer Organization A Guide to Principles Across RISC-V, ARM Cortex, and Intel Architectures
This textbook unlocks modern computer organizations' secrets, with real-world examples from RISC-V, ARM, and Intel-based computer systems. The guide...
-
Implementing Lattice-Based PQC on Resource-Constrained Processors:
This paper studies the implementation of the lattice-based PQC on the 32-bit constrained processors that only have constrained multiplication... -
Performance Evaluation of Raspberry Pi 4B Microcomputer: Case Studies on MPICH Cluster, VMware ES** ARM Fling, and Windows 11 ARM OS
The performance of the Raspberry Pi 4B computer was evaluated for three cases. First, a Raspberry Pi heterogeneous MPICH cluster with weight-based... -
No Silver Bullet: Optimized Montgomery Multiplication on Various 64-Bit ARM Platforms
In this paper, we firstly presented optimized implementations of Montgomery multiplication on 64-bit ARM processors by taking advantages of Karatsuba... -
Augmented Reality for Real-Time Control of a Robotic Arm with IoT Connection
Augmented Reality (AR) is one of the most important technologies that takes part in the Fourth Industrial Revolution, and for this reason, this...