Results 81 to 90 of about 11,679 (206)

Improved Correlation Power Analysis Attack on the Latest Cortex M4 Kyber Implementation

open access: yesCryptography
CRYSTALS-Kyber has been standardized as a general public-key post-quantum algorithm under the name of ML-KEM after NIST released its first three final post-quantum standards in August 2024.
Costin Ghiban, Marios Omar Choudary
doaj   +1 more source

Efficient Scheduling Algorithms for Multicore Cyclic Executives With Precedence and Exclusion Relations

open access: yesConcurrency and Computation: Practice and Experience, Volume 38, Issue 5, March 2026.
ABSTRACT Cyclic executives (CEs) offer the advantage of ensuring complete determinism with minimal runtime overhead, often making them the preferred choice for safety‐critical real‐time systems. However, generating CEs for multicore processors while addressing task precedence and exclusion relations presents significant challenges.
Bruno Nogueira   +4 more
wiley   +1 more source

Infrared video tracking of UAVs: Guided landing in the absence of GPS signals [PDF]

open access: yes, 2019
Master's Project (M.S.) University of Alaska Fairbanks, 2019Unmanned Aerial Vehicles (UAVs) use Global Positioning System (GPS) signals to determine their position for automated flight.
Graves, Logan W.
core  

Saber on ARM

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
The CCA-secure lattice-based post-quantum key encapsulation scheme Saber is a candidate in the NIST’s post-quantum cryptography standardization process.
Angshuman Karmakar   +3 more
doaj   +1 more source

Quantum Resistance Saber-Based Group Key Exchange Protocol for IoT

open access: yesIEEE Open Journal of the Communications Society
Quantum computing poses a threat on current cryptography methods, prompting initiatives such as the U.S. National Institute for Standards and Technology (NIST) standardization process toward developing post-quantum cryptographic tools.
Fouzia Samiullah   +3 more
doaj   +1 more source

Integrated Analysis of Brain Transcriptome Reveals Convergent Molecular Pathways in Autism Spectrum Disorder

open access: yesFrontiers in Psychiatry, 2019
Autism spectrum disorder (ASD) is a set of complex neurodevelopmental disorders with etiology that remains elusive. Although there is a mounting body of investigation in different brain regions related to ASD, our knowledge about the common and distinct ...
Xiaodan Li   +19 more
doaj   +1 more source

STM32F429 Based CMOS Camera for Teaching Purposes [PDF]

open access: yes, 2015
Diplomová práce se zabývá zpracováním obrazu na vestavném mikrořadiči s jádrem ARM Cortex - M4. Cílem je ukázat jednoduché možnosti připojení různých obrazových CMOS senzorů k sériově vyráběnému vývojovému kitu, a to jak po programové, tak po hardwarové ...
Dokoupil Vojtěch
core  

Recovering the CTR_DRBG state in 256 traces

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2019
The NIST CTR_DRBG specification prescribes a maximum size on each random number request, limiting the number of encryptions in CTR mode with the same key to 4 096.
Lauren De Meyer
doaj   +1 more source

A wireless interface for the Pitote tube [PDF]

open access: yes, 2014
A pitot tube is a pressure measurement instrument used to measure fluid flow velocity. Most often, pitot tubes are used to determine the speed of aircraft and boats.
Kren, Matevž
core  

Desde CoOs hasta .NetFramework: comunicación hardware/software mediante VCP [PDF]

open access: yes, 2014
En este artículo se describe una práctica de laboratorio para la docencia de sistemas operativos en tiempo real (RTOS) para microcontroladores de 32bits en el ámbito de los grados en Ingeniería de Computadores, mediante una metodología de aprendizaje
Cerezuela-Escudero, Elena   +5 more
core  

Home - About - Disclaimer - Privacy