Results 91 to 100 of about 10,046 (210)

pqm4: Testing and Benchmarking NIST PQC on ARM Cortex-M4 [PDF]

open access: yes, 2019
Contains fulltext : 210214.pdf (Publisher’s version ) (Open Access)
Kannwischer, M.J.   +3 more
openaire  

Real-Time Monitoring & Adaptive Protection of Power Transformer to Enhance Smart Grid Reliability

open access: yesElectrical, Control and Communication Engineering, 2019
Power transformer is one of the most important pieces of equipment in the grid to reliably and efficiently transmit power to the consumers. Asset management and protection are the best concepts for prolongation of transformer lifespan as well as for the ...
Raichura Maulik   +2 more
doaj   +1 more source

Differential Fault Attacks on Deterministic Lattice Signatures

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
In this paper, we extend the applicability of differential fault attacks to lattice-based cryptography. We show how two deterministic lattice-based signature schemes, Dilithium and qTESLA, are vulnerable to such attacks.
Leon Groot Bruinderink, Peter Pessl
doaj   +1 more source

Slotted ALOHA Overlay on LoRaWAN: a Distributed Synchronization Approach

open access: yes, 2018
LoRaWAN is one of the most promising standards for IoT applications. Nevertheless, the high density of end-devices expected for each gateway, the absence of an effective synchronization scheme between gateway and end-devices, challenge the scalability of
Benini, Luca   +2 more
core   +1 more source

PORTING OF FREERTOS ON A PYTHON VIRTUAL MACHINE FOR EMBEDDED AND IOT DEVICES [PDF]

open access: yes, 2017
The fourth industrial revolution, The Industry 4.0, puts emphasis on the need of “Smart” and “Connected” objects through the use of services provided by Internet of Things, cyber-physical systems and cloud computing to optimize the cost, development time
AHMAD, NISAR
core  

Secure and Efficient RNS Approach for Elliptic Curve Cryptography [PDF]

open access: yes, 2016
Scalar multiplication, the main operation in elliptic curve cryptographic protocols, is vulnerable to side-channel (SCA) and fault injection (FA) attacks.
Batina, Lejla   +3 more
core  

Family Independent Microcontroller Programming Library [PDF]

open access: yes, 2014
Práce se zabývá návrhem knihovny pro vývoj aplikací pro mikrokontroléry nezávisle na cílové platformě. Po stručném shrnutí stávající situace je rozebírán návrh architektury, která umožní zakrýt specifika různých modelů MCU a poskytnout jednotné API pro ...
Konečný, Ondřej
core  

Performance Analysis of Rainbow on ARM Cortex-M4

open access: yes, 2019
The risk posed by a fully operational quantum computer has anticipated a revolution in the way to approach the level of security provided by a cryptographic algorithm. Public keybased solutions such as RSA or ECC will be easily broken once we enter the post-quantum era.
openaire   +1 more source

ISEV2025 Abstract Book

open access: yes
Journal of Extracellular Vesicles, Volume 14, Issue S1, October 2025.
wiley   +1 more source

UEG Week 2025 Poster Presentations

open access: yes
United European Gastroenterology Journal, Volume 13, Issue S8, Page S803-S1476, October 2025.
wiley   +1 more source

Home - About - Disclaimer - Privacy