We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 2,589 results
  1. ARM Architecture and Programming

    This chapter covers the ARM architecture, ARM instructions, ARM programming, and development of programs for execution on ARM virtual machines. These...
    Chapter 2023
  2. Benchmarking and Analysing the NIST PQC Lattice-Based Signature Schemes Standards on the ARM Cortex M7

    This paper presents an analysis of the two lattice-based digital signature schemes, Dilithium and Falcon, which have been chosen by NIST for...
    James Howe, Bas Westerbaan in Progress in Cryptology - AFRICACRYPT 2023
    Conference paper 2023
  3. ARM TrustZone and Secure Operating Systems

    This chapter covers ARM TrustZone technology and secure operating systems. It first describes the ARM TrustZone technology as a security extension in...
    Chapter 2023
  4. A comprehensive sensorimotor control model emulating neural activities for planar human arm reaching movements

    Functional Electrical Stimulation (FES) has demonstrated potential in clinical applications, but determining the optimal electrical current to...

    Yongkun Zhao, Mingquan Zhang, ... Masahiro Todoh in Applied Intelligence
    Article 07 February 2024
  5. Comprehensive analysis of energy efficiency and performance of ARM and RISC-V SoCs

    Over the past few years, ARM has been the dominant player in embedded systems and System-on-Chips (SoCs). With the emergence of hardware platforms...

    Daniel Suárez, Francisco Almeida, Vicente Blanco in The Journal of Supercomputing
    Article Open access 20 February 2024
  6. ARMing-Sword: Scabbard on ARM

    Scabbard, one of the Post-quantum Key Encapsulation Mechanisms (KEM), is a improved version of Saber that Lattice-based Key Encapsulation Mechanism....
    Hyeokdong Kwon, Hyunjun Kim, ... Hwajeong Seo in Information Security Applications
    Conference paper 2023
  7. Automatic generation of ARM NEON micro-kernels for matrix multiplication

    General matrix multiplication ( gemm ) is a fundamental kernel in scientific computing and current frameworks for deep learning. Modern realisations of gemm...

    Guillermo Alaejos, Héctor Martínez, ... Enrique S. Quintana-Ortí in The Journal of Supercomputing
    Article Open access 12 March 2024
  8. Performance–energy trade-offs of deep learning convolution algorithms on ARM processors

    In this work, we assess the performance and energy efficiency of high-performance codes for the convolution operator, based on the direct,...

    Manuel F. Dolz, Sergio Barrachina, ... Andrés E. Tomás in The Journal of Supercomputing
    Article Open access 21 January 2023
  9. SABER post-quantum key encapsulation mechanism (KEM): evaluating performance in ARM and x64 architectures

    SABER is one of the four finalists in the third round of the ongoing NIST post-quantum cryptography standardization process. It is one of the three...

    Leonardo A. D. S. Ribeiro, José Paulo da Silva Lima, ... André L. M. Santos in Journal of Cryptographic Engineering
    Article 16 October 2023
  10. Side-channel analysis against ANSSI’s protected AES implementation on ARM: end-to-end attacks with multi-task learning

    In 2019, ANSSI released a protected software implementation of AES running on an STM32 platform with ARM Cortex-M architecture, publicly available on...

    Loïc Masure, Rémi Strullu in Journal of Cryptographic Engineering
    Article 10 March 2023
  11. Virtual Model of a Robotic Arm Digital Twin with MuJoCo

    In this paper, a digital twin architecture for a Robotis manipulator’s arm is constructed on the Mujoco physics engine SDK. The virtual model in the...
    Bernardo Perez Inturias, João Pedro Garbelini Marques de Oliveira, Mauricio Becerra Vargas in Robotics, Computer Vision and Intelligent Systems
    Conference paper 2024
  12. A Sub-Riemannian Model of the Functional Architecture of M1 for Arm Movement Direction

    In this paper we propose a neurogeometrical model of the behaviour of cells of the arm area of the primary motor cortex (M1). We mathematically...
    Caterina Mazzetti, Alessandro Sarti, Giovanna Citti in Geometric Science of Information
    Conference paper 2023
  13. Performance Evaluation of Raspberry Pi 4B Microcomputer: Case Studies on MPICH Cluster, VMware ES** ARM Fling, and Windows 11 ARM OS

    The performance of the Raspberry Pi 4B computer was evaluated for three cases. First, a Raspberry Pi heterogeneous MPICH cluster with weight-based...
    Conference paper 2022
  14. A Side-Channel Based Disassembler for the ARM-Cortex M0

    The most common application for side-channel attacks is the extraction of secret information, such as key material, from the implementation of a...
    Jurian van Geest, Ileana Buhan in Applied Cryptography and Network Security Workshops
    Conference paper 2022
  15. An integrated AGV control system using preemptive and non-preemptive mixed RTOS

    The automated guided vehicle (AGV) is currently used in a wide range of industries. The control system is the core of the AGV, responsible for task...

    Daozheng Chen, Jun Gao, ... Hongchen Guo in The Journal of Supercomputing
    Article 28 May 2024
  16. SPEEDY on Cortex–M3: Efficient Software Implementation of SPEEDY on ARM Cortex–M3

    The SPEEDY block cipher suite announced at CHES 2021 shows excellent hardware performance. However, SPEEDY was not designed to be efficient in...
    Hyunjun Kim, Kyungbae Jang, ... Hwajeong Seo in Information Security and Cryptology – ICISC 2021
    Conference paper 2022
  17. Curve448 on 32-Bit ARM Cortex-M4

    Public key cryptography is widely used in key exchange and digital signature protocols. Public key cryptography requires expensive primitive...
    Hwajeong Seo, Reza Azarderakhsh in Information Security and Cryptology – ICISC 2020
    Conference paper 2021
  18. Brain–Computer Interface for Fuzzy Position Control of a Robot Arm by Mentally Detected Magnitude and Sign of Positional Error

    The paper addresses a novel approach to position control of a robot arm by utilizing three important brain signals, acquired with the help of an EEG...
    Conference paper 2023
  19. No Silver Bullet: Optimized Montgomery Multiplication on Various 64-Bit ARM Platforms

    In this paper, we firstly presented optimized implementations of Montgomery multiplication on 64-bit ARM processors by taking advantages of Karatsuba...
    Hwajeong Seo, Pakize Sanal, ... Reza Azarderakhsh in Information Security Applications
    Conference paper 2021
  20. Efficient Multiplication of Somewhat Small Integers Using Number-Theoretic Transforms

    Conventional wisdom purports that FFT-based integer multiplication methods (such as the Schönhage–Strassen algorithm) begin to compete with Karatsuba...
    Hanno Becker, Vincent Hwang, ... Bo-Yin Yang in Advances in Information and Computer Security
    Conference paper 2022
Did you find what you were looking for? Share feedback.