Results 21 to 30 of about 11,679 (206)

A PUF-and biometric-based lightweight hardware solution to increase security at sensor nodes [PDF]

open access: yes, 2018
Security is essential in sensor nodes which acquire and transmit sensitive data. However, the constraints of processing, memory and power consumption are very high in these nodes. Cryptographic algorithms based on symmetric key are very suitable for them.
Arcenegui, Javier   +3 more
core   +1 more source

Multi-Parameter Support with NTTs for NTRU and NTRU Prime on Cortex-M4

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
We propose NTT implementations with each supporting at least one parameter of NTRU and one parameter of NTRU Prime. Our implementations are based on size-1440, size-1536, and size-1728 convolutions without algebraic assumptions on the target polynomial ...
Erdem Alkim, Vincent Hwang, Bo-Yin Yang
doaj   +3 more sources

Polynomial Multiplication in NTRU Prime

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
This paper proposes two different methods to perform NTT-based polynomial multiplication in polynomial rings that do not naturally support such a multiplication. We demonstrate these methods on the NTRU Prime key-encapsulation mechanism (KEM) proposed by
Erdem Alkim   +10 more
doaj   +3 more sources

TASKers: A Whole-System Generator for Benchmarking Real-Time-System Analyses [PDF]

open access: yes, 2018
Implementation-based benchmarking of timing and schedulability analyses requires system code that can be executed on real hardware and has defined properties, for example, known worst-case execution times (WCETs) of tasks.
Distler, Tobias   +2 more
core   +1 more source

Characterising and Comparing the Energy Consumption of Side Channel Attack Countermeasures and Lightweight Cryptography on Embedded Devices [PDF]

open access: yes, 2016
This paper uses an Instruction Set Architecture(ISA) based statistical energy model of an ARM Cortex-M4microprocessor to evaluate the energy consumption of an implementation of AES with different side channel attack (SCA) countermeasures and an ...
Eder, Kerstin I   +2 more
core   +2 more sources

A wearable fetal movement detection system for pregnant women

open access: yesFrontiers in Medicine, 2023
A wearable device-based fetal movement detection system for pregnant women is proposed to resolve the problems of low accuracy of fetal movement detection by fetal heart monitor, difficulties of fetal movement monitoring by pregnant women in person, and ...
Manping Qin   +4 more
doaj   +1 more source

Analysis and Comparison of Table-based Arithmetic to Boolean Masking

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
Masking is a popular technique to protect cryptographic implementations against side-channel attacks and comes in several variants including Boolean and arithmetic masking.
Michiel Van Beirendonck   +2 more
doaj   +1 more source

Modular control system for embedded applications [PDF]

open access: yes, 2016
This paper deals with hardware design of a modular control system intended for embedded applications demanding high computational power while maintaining low cost.
Dolinay, Jan   +2 more
core   +2 more sources

Memory Efficient Implementation of Modular Multiplication for 32-bit ARM Cortex-M4

open access: yesApplied Sciences, 2020
In this paper, we present scalable multi-precision multiplication implementation and scalable multi-precision squaring implementation for 32-bit ARM Cortex-M4 microcontrollers.
Hwajeong Seo
doaj   +1 more source

PULP-HD: Accelerating Brain-Inspired High-Dimensional Computing on a Parallel Ultra-Low Power Platform

open access: yes, 2018
Computing with high-dimensional (HD) vectors, also referred to as $\textit{hypervectors}$, is a brain-inspired alternative to computing with scalars.
Benatti, Simone   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy