Results 21 to 30 of about 11,679 (206)
A PUF-and biometric-based lightweight hardware solution to increase security at sensor nodes [PDF]
Security is essential in sensor nodes which acquire and transmit sensitive data. However, the constraints of processing, memory and power consumption are very high in these nodes. Cryptographic algorithms based on symmetric key are very suitable for them.
Arcenegui, Javier +3 more
core +1 more source
Multi-Parameter Support with NTTs for NTRU and NTRU Prime on Cortex-M4
We propose NTT implementations with each supporting at least one parameter of NTRU and one parameter of NTRU Prime. Our implementations are based on size-1440, size-1536, and size-1728 convolutions without algebraic assumptions on the target polynomial ...
Erdem Alkim, Vincent Hwang, Bo-Yin Yang
doaj +3 more sources
Polynomial Multiplication in NTRU Prime
This paper proposes two different methods to perform NTT-based polynomial multiplication in polynomial rings that do not naturally support such a multiplication. We demonstrate these methods on the NTRU Prime key-encapsulation mechanism (KEM) proposed by
Erdem Alkim +10 more
doaj +3 more sources
TASKers: A Whole-System Generator for Benchmarking Real-Time-System Analyses [PDF]
Implementation-based benchmarking of timing and schedulability analyses requires system code that can be executed on real hardware and has defined properties, for example, known worst-case execution times (WCETs) of tasks.
Distler, Tobias +2 more
core +1 more source
Characterising and Comparing the Energy Consumption of Side Channel Attack Countermeasures and Lightweight Cryptography on Embedded Devices [PDF]
This paper uses an Instruction Set Architecture(ISA) based statistical energy model of an ARM Cortex-M4microprocessor to evaluate the energy consumption of an implementation of AES with different side channel attack (SCA) countermeasures and an ...
Eder, Kerstin I +2 more
core +2 more sources
A wearable fetal movement detection system for pregnant women
A wearable device-based fetal movement detection system for pregnant women is proposed to resolve the problems of low accuracy of fetal movement detection by fetal heart monitor, difficulties of fetal movement monitoring by pregnant women in person, and ...
Manping Qin +4 more
doaj +1 more source
Analysis and Comparison of Table-based Arithmetic to Boolean Masking
Masking is a popular technique to protect cryptographic implementations against side-channel attacks and comes in several variants including Boolean and arithmetic masking.
Michiel Van Beirendonck +2 more
doaj +1 more source
Modular control system for embedded applications [PDF]
This paper deals with hardware design of a modular control system intended for embedded applications demanding high computational power while maintaining low cost.
Dolinay, Jan +2 more
core +2 more sources
Memory Efficient Implementation of Modular Multiplication for 32-bit ARM Cortex-M4
In this paper, we present scalable multi-precision multiplication implementation and scalable multi-precision squaring implementation for 32-bit ARM Cortex-M4 microcontrollers.
Hwajeong Seo
doaj +1 more source
Computing with high-dimensional (HD) vectors, also referred to as $\textit{hypervectors}$, is a brain-inspired alternative to computing with scalars.
Benatti, Simone +4 more
core +1 more source

