Results 91 to 100 of about 10,046 (210)
pqm4: Testing and Benchmarking NIST PQC on ARM Cortex-M4 [PDF]
Contains fulltext : 210214.pdf (Publisher’s version ) (Open Access)
Kannwischer, M.J. +3 more
openaire
Real-Time Monitoring & Adaptive Protection of Power Transformer to Enhance Smart Grid Reliability
Power transformer is one of the most important pieces of equipment in the grid to reliably and efficiently transmit power to the consumers. Asset management and protection are the best concepts for prolongation of transformer lifespan as well as for the ...
Raichura Maulik +2 more
doaj +1 more source
Differential Fault Attacks on Deterministic Lattice Signatures
In this paper, we extend the applicability of differential fault attacks to lattice-based cryptography. We show how two deterministic lattice-based signature schemes, Dilithium and qTESLA, are vulnerable to such attacks.
Leon Groot Bruinderink, Peter Pessl
doaj +1 more source
Slotted ALOHA Overlay on LoRaWAN: a Distributed Synchronization Approach
LoRaWAN is one of the most promising standards for IoT applications. Nevertheless, the high density of end-devices expected for each gateway, the absence of an effective synchronization scheme between gateway and end-devices, challenge the scalability of
Benini, Luca +2 more
core +1 more source
PORTING OF FREERTOS ON A PYTHON VIRTUAL MACHINE FOR EMBEDDED AND IOT DEVICES [PDF]
The fourth industrial revolution, The Industry 4.0, puts emphasis on the need of “Smart” and “Connected” objects through the use of services provided by Internet of Things, cyber-physical systems and cloud computing to optimize the cost, development time
AHMAD, NISAR
core
Secure and Efficient RNS Approach for Elliptic Curve Cryptography [PDF]
Scalar multiplication, the main operation in elliptic curve cryptographic protocols, is vulnerable to side-channel (SCA) and fault injection (FA) attacks.
Batina, Lejla +3 more
core
Family Independent Microcontroller Programming Library [PDF]
Práce se zabývá návrhem knihovny pro vývoj aplikací pro mikrokontroléry nezávisle na cílové platformě. Po stručném shrnutí stávající situace je rozebírán návrh architektury, která umožní zakrýt specifika různých modelů MCU a poskytnout jednotné API pro ...
Konečný, Ondřej
core
Performance Analysis of Rainbow on ARM Cortex-M4
The risk posed by a fully operational quantum computer has anticipated a revolution in the way to approach the level of security provided by a cryptographic algorithm. Public keybased solutions such as RSA or ECC will be easily broken once we enter the post-quantum era.
openaire +1 more source
UEG Week 2025 Poster Presentations
United European Gastroenterology Journal, Volume 13, Issue S8, Page S803-S1476, October 2025.
wiley +1 more source

