Search
Search Results
-
ARM Architecture and Programming
This chapter covers the ARM architecture, ARM instructions, ARM programming, and development of programs for execution on ARM virtual machines. These... -
Benchmarking and Analysing the NIST PQC Lattice-Based Signature Schemes Standards on the ARM Cortex M7
This paper presents an analysis of the two lattice-based digital signature schemes, Dilithium and Falcon, which have been chosen by NIST for... -
ARM TrustZone and Secure Operating Systems
This chapter covers ARM TrustZone technology and secure operating systems. It first describes the ARM TrustZone technology as a security extension in... -
A comprehensive sensorimotor control model emulating neural activities for planar human arm reaching movements
Functional Electrical Stimulation (FES) has demonstrated potential in clinical applications, but determining the optimal electrical current to...
-
Comprehensive analysis of energy efficiency and performance of ARM and RISC-V SoCs
Over the past few years, ARM has been the dominant player in embedded systems and System-on-Chips (SoCs). With the emergence of hardware platforms...
-
ARMing-Sword: Scabbard on ARM
Scabbard, one of the Post-quantum Key Encapsulation Mechanisms (KEM), is a improved version of Saber that Lattice-based Key Encapsulation Mechanism.... -
Automatic generation of ARM NEON micro-kernels for matrix multiplication
General matrix multiplication ( gemm ) is a fundamental kernel in scientific computing and current frameworks for deep learning. Modern realisations of gemm...
-
Performance–energy trade-offs of deep learning convolution algorithms on ARM processors
In this work, we assess the performance and energy efficiency of high-performance codes for the convolution operator, based on the direct,...
-
SABER post-quantum key encapsulation mechanism (KEM): evaluating performance in ARM and x64 architectures
SABER is one of the four finalists in the third round of the ongoing NIST post-quantum cryptography standardization process. It is one of the three...
-
Side-channel analysis against ANSSI’s protected AES implementation on ARM: end-to-end attacks with multi-task learning
In 2019, ANSSI released a protected software implementation of AES running on an STM32 platform with ARM Cortex-M architecture, publicly available on...
-
Virtual Model of a Robotic Arm Digital Twin with MuJoCo
In this paper, a digital twin architecture for a Robotis manipulator’s arm is constructed on the Mujoco physics engine SDK. The virtual model in the... -
A Sub-Riemannian Model of the Functional Architecture of M1 for Arm Movement Direction
In this paper we propose a neurogeometrical model of the behaviour of cells of the arm area of the primary motor cortex (M1). We mathematically... -
Performance Evaluation of Raspberry Pi 4B Microcomputer: Case Studies on MPICH Cluster, VMware ES** ARM Fling, and Windows 11 ARM OS
The performance of the Raspberry Pi 4B computer was evaluated for three cases. First, a Raspberry Pi heterogeneous MPICH cluster with weight-based... -
A Side-Channel Based Disassembler for the ARM-Cortex M0
The most common application for side-channel attacks is the extraction of secret information, such as key material, from the implementation of a... -
An integrated AGV control system using preemptive and non-preemptive mixed RTOS
The automated guided vehicle (AGV) is currently used in a wide range of industries. The control system is the core of the AGV, responsible for task...
-
SPEEDY on Cortex–M3: Efficient Software Implementation of SPEEDY on ARM Cortex–M3
The SPEEDY block cipher suite announced at CHES 2021 shows excellent hardware performance. However, SPEEDY was not designed to be efficient in... -
Curve448 on 32-Bit ARM Cortex-M4
Public key cryptography is widely used in key exchange and digital signature protocols. Public key cryptography requires expensive primitive... -
Brain–Computer Interface for Fuzzy Position Control of a Robot Arm by Mentally Detected Magnitude and Sign of Positional Error
The paper addresses a novel approach to position control of a robot arm by utilizing three important brain signals, acquired with the help of an EEG... -
No Silver Bullet: Optimized Montgomery Multiplication on Various 64-Bit ARM Platforms
In this paper, we firstly presented optimized implementations of Montgomery multiplication on 64-bit ARM processors by taking advantages of Karatsuba... -
Efficient Multiplication of Somewhat Small Integers Using Number-Theoretic Transforms
Conventional wisdom purports that FFT-based integer multiplication methods (such as the Schönhage–Strassen algorithm) begin to compete with Karatsuba...