Results 81 to 90 of about 11,679 (206)
Improved Correlation Power Analysis Attack on the Latest Cortex M4 Kyber Implementation
CRYSTALS-Kyber has been standardized as a general public-key post-quantum algorithm under the name of ML-KEM after NIST released its first three final post-quantum standards in August 2024.
Costin Ghiban, Marios Omar Choudary
doaj +1 more source
ABSTRACT Cyclic executives (CEs) offer the advantage of ensuring complete determinism with minimal runtime overhead, often making them the preferred choice for safety‐critical real‐time systems. However, generating CEs for multicore processors while addressing task precedence and exclusion relations presents significant challenges.
Bruno Nogueira +4 more
wiley +1 more source
Infrared video tracking of UAVs: Guided landing in the absence of GPS signals [PDF]
Master's Project (M.S.) University of Alaska Fairbanks, 2019Unmanned Aerial Vehicles (UAVs) use Global Positioning System (GPS) signals to determine their position for automated flight.
Graves, Logan W.
core
The CCA-secure lattice-based post-quantum key encapsulation scheme Saber is a candidate in the NIST’s post-quantum cryptography standardization process.
Angshuman Karmakar +3 more
doaj +1 more source
Quantum Resistance Saber-Based Group Key Exchange Protocol for IoT
Quantum computing poses a threat on current cryptography methods, prompting initiatives such as the U.S. National Institute for Standards and Technology (NIST) standardization process toward developing post-quantum cryptographic tools.
Fouzia Samiullah +3 more
doaj +1 more source
Autism spectrum disorder (ASD) is a set of complex neurodevelopmental disorders with etiology that remains elusive. Although there is a mounting body of investigation in different brain regions related to ASD, our knowledge about the common and distinct ...
Xiaodan Li +19 more
doaj +1 more source
STM32F429 Based CMOS Camera for Teaching Purposes [PDF]
Diplomová práce se zabývá zpracováním obrazu na vestavném mikrořadiči s jádrem ARM Cortex - M4. Cílem je ukázat jednoduché možnosti připojení různých obrazových CMOS senzorů k sériově vyráběnému vývojovému kitu, a to jak po programové, tak po hardwarové ...
Dokoupil Vojtěch
core
Recovering the CTR_DRBG state in 256 traces
The NIST CTR_DRBG specification prescribes a maximum size on each random number request, limiting the number of encryptions in CTR mode with the same key to 4 096.
Lauren De Meyer
doaj +1 more source
A wireless interface for the Pitote tube [PDF]
A pitot tube is a pressure measurement instrument used to measure fluid flow velocity. Most often, pitot tubes are used to determine the speed of aircraft and boats.
Kren, Matevž
core
Desde CoOs hasta .NetFramework: comunicación hardware/software mediante VCP [PDF]
En este artículo se describe una práctica de laboratorio para la docencia de sistemas operativos en tiempo real (RTOS) para microcontroladores de 32bits en el ámbito de los grados en Ingeniería de Computadores, mediante una metodología de aprendizaje
Cerezuela-Escudero, Elena +5 more
core

