Results 11 to 20 of about 511,028 (202)

Faster Kyber and Dilithium on the Cortex-M4

open access: yesIACR Cryptology ePrint Archive, 2022
Contains fulltext : 253538.pdf (Publisher’s version ) (Open Access)
Aminudeen Abdulrahman   +3 more
semanticscholar   +3 more sources

A Sub-mW Cortex-M4 Microcontroller Design for IoT Software-Defined Radios

open access: yesIEEE Open Journal of Circuits and Systems, 2023
We present an Internet-of-Things (IoT) software-defined radio platform based on an ultra low-power microcontroller. Whereas conventional wireless IoT radios often implement a single protocol, we demonstrate that general-purpose microcontrollers running ...
Mathieu Xhonneux   +2 more
doaj   +2 more sources

Generation of Fast Finite Field Arithmetic forCortex-M4 with ECDH and SQIsign Applications

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Finite field arithmetic is central to several cryptographic algorithms on embedded devices like the ARM Cortex-M4, particularly for elliptic curve and isogenybased cryptography.
Felix Carvalho Rodrigues   +7 more
doaj   +2 more sources

Multi-Parameter Support with NTTs for NTRU and NTRU Prime on Cortex-M4

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
We propose NTT implementations with each supporting at least one parameter of NTRU and one parameter of NTRU Prime. Our implementations are based on size-1440, size-1536, and size-1728 convolutions without algebraic assumptions on the target polynomial ...
Erdem Alkim, Vincent Hwang, Bo-Yin Yang
doaj   +4 more sources

Optimized Falcon Verify on Cortex-M4 for Post-Quantum secure UAV communications

open access: yesICT Express
Falcon, a NIST-standardized DSA, is ideal for broadcast-based communication like UAV due to its short key and signature. Since each UAV broadcasts the signed message to surrounding parties, UAVs must verify numerous signatures in flight.
JunHyeok Choi   +2 more
doaj   +2 more sources

Improved Correlation Power Analysis Attack on the Latest Cortex M4 Kyber Implementation

open access: yesCryptography
CRYSTALS-Kyber has been standardized as a general public-key post-quantum algorithm under the name of ML-KEM after NIST released its first three final post-quantum standards in August 2024.
Costin Ghiban, Marios Omar Choudary
doaj   +2 more sources

Gene Regulatory Programs of NK Cells Show That NCAM1 (CD56) and KIRs Are Controlled by Genetically Polymorphic Distal Regulatory Elements [PDF]

open access: yesEur J Immunol
A deeper understanding of the natural killer cell gene expression regulation driving NK cell maturation and cytotoxicity could provide critical insights into optimizing NK therapies. Our findings reveal novel enhancers governing NK cell genes for NCAM1/CD56 and cis‐regulation for KIR receptors and clarify existing models of NK cell cis‐accessibility ...
Salem M   +9 more
europepmc   +2 more sources

Exploring Adjunctive Novel Therapeutic Approach of KarXT (Xanomeline-Trospium Chloride) for Managing Psychotic Symptoms in Patients With Schizophrenia and Alzheimer's Disease. [PDF]

open access: yesBrain Behav
An overview of the mechanism of action, clinical trials, and classical findings of KarXT for the management of psychotic symptoms in patients with schizophrenia and alzheimer's disease. ABSTRACT Background Acute psychotic symptoms like delusions and hallucinations are of major concern while treating patients with schizophrenia and alzheimer's psychosis,
Kanwal A   +7 more
europepmc   +2 more sources

ESPM-D: Efficient Sparse Polynomial Multiplication for Dilithium on ARM Cortex-M4 and Apple M2

open access: yesarXiv.org
Dilithium is a lattice-based digital signature scheme standardized by the NIST post-quantum cryptography (PQC) project. In this study, we focus on developing efficient sparse polynomial multiplication implementations of Dilithium for ARM Cortex-M4 and ...
Chu, Zhiwei   +7 more
core   +2 more sources

Supersingular Isogeny Key Encapsulation (SIKE) Round 2 on ARM Cortex-M4

open access: yesIEEE Transactions on Computers, 2020
We present the first practical software implementation of Supersingular Isogeny Key Encapsulation (SIKE) round 2, targeting NIST's 1, 2, 3, and 5 security levels on 32-bit ARM Cortex-M4 microcontrollers. The proposed library introduces a new speed record
Hwajeong Seo   +3 more
semanticscholar   +2 more sources

Home - About - Disclaimer - Privacy