Results 91 to 100 of about 11,679 (206)

MulLeak: Exploiting Multiply Instruction Leakage to Attack the Stack-optimized Kyber Implementation on Cortex-M4

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
CRYSTALS-Kyber, one of the NIST PQC standardization schemes, has garnered considerable attention from researchers in recent years for its side-channel security.
Fan Huang   +4 more
doaj   +1 more source

Control board with a microprocessor SAM4 [PDF]

open access: yes
Procesory ARM jsou dnes jedny z nejpoužívanějších procesorů v oblasti číslicových systémů. Obsahem předložené diplomové práce je návrh univerzální řídicí jednotky pro použití v průmyslové automatizaci, která disponuje dostatečným počtem analogových a ...
Melichar Jiří
core  

Are Intramedullary Implants Used for Midfoot Charcot Fit for Female Metatarsals?

open access: yesFoot & Ankle Orthopaedics
Category: Midfoot/Forefoot; Basic Sciences/Biologics Introduction/Purpose: Radiological assessments of metatarsal biometrics have been documented in few studies and often lack direct clinical significance.
Kaissar Yammine MD, PhD   +5 more
doaj   +1 more source

Програмування за допомогою робота [PDF]

open access: yes, 2016
Для того, аби більше заохотити студентів розвиватися в програмуванні та електроніці, навчання потребує застосування сучасних методів реалізації практичних навичок.
Михальова, К.Ю.
core  

Operacijski sistem za mikrokrmilnik ARM Cortex M4

open access: yes, 2020
V diplomski nalogi predstavimo implementacijo operacijskega sistema za mikrokrmilnike. Sistem je narejen po zgledu FreeRTOS operacijskega sistema, ki je med najbolj priljubljenimi operacijskimi sistemi RTOS. Najprej predstavimo implementacijo razvrščevalnika in menjavanja konteksta, ki sta ključna dela RTOS operacijskega sistema.
openaire   +1 more source

KyberSlash: Exploiting secret-dependent division timings in Kyber implementations

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
This paper presents KyberSlash1 and KyberSlash2 – two timing vulnerabilities in several implementations (including the official reference code) of the Kyber Post-Quantum Key Encapsulation Mechanism, recently standardized as ML-KEM.
Daniel J. Bernstein   +9 more
doaj   +1 more source

Transcriptomic analysis of rat prefrontal cortex following chronic stress induced by social isolation – Relevance to psychiatric and neurodevelopmental illness, and implications for treatment

open access: yesNeurobiology of Stress
Social isolation is an established risk factor for psychiatric illness, and became increasingly topical with the spread of SARS-CoV-2. We used RNA sequencing (RNA-Seq) to enable unbiased assessment of transcriptomic changes within the prefrontal cortex ...
Jen-Yin Goh   +8 more
doaj   +1 more source

Control de una caldera con procesador ARM Cortex M4

open access: yes, 2023
Grado en Ingeniería en Electrónica Industrial y ...
openaire   +1 more source

Memory-Efficient High-Speed Implementation of Kyber on Cortex-M4

open access: yes, 2019
This paper presents an optimized software implementation of the module-lattice-based key-encapsulation mechanism Kyber for the ARM Cortex-M4 microcontroller. Kyber is one of the round-2 candidates in the NIST post-quantum project. In the center of our work are novel optimization techniques for the number-theoretic transform (NTT) inside Kyber, which ...
Botros, Leon   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy