Results 11 to 20 of about 6,871,078 (322)
Masked Accelerators and Instruction Set Extensions for Post-Quantum Cryptography
Side-channel attacks can break mathematically secure cryptographic systems leading to a major concern in applied cryptography. While the cryptanalysis and security evaluation of Post-Quantum Cryptography (PQC) have already received an increasing research
Tim Fritzmann+6 more
doaj +2 more sources
The design of scalar AES Instruction Set Extensions for RISC-V
Secure, efficient execution of AES is an essential requirement on most computing platforms. Dedicated Instruction Set Extensions (ISEs) are often included for this purpose. RISC-V is a (relatively) new ISA that lacks such a standardized ISE.
Ben Marshall+4 more
doaj +4 more sources
Quantum Instruction Set Design for Performance [PDF]
2 figures in main text and 21 figures in Supplementary Materials. This manuscript subsumes version 1 with significant improvements such as experimental demonstration and materials ...
Cupjin Huang+12 more
openaire +4 more sources
SISA: Set-Centric Instruction Set Architecture for Graph Mining on Processing-in-Memory Systems [PDF]
Simple graph algorithms such as PageRank have been the target of numerous hardware accelerators. Yet, there also exist much more complex graph mining algorithms for problems such as clustering or maximal clique listing.
Maciej Besta+16 more
semanticscholar +1 more source
NetQASM—a low-level instruction set architecture for hybrid quantum–classical programs in a quantum internet [PDF]
We introduce NetQASM, a low-level instruction set architecture for quantum internet applications. NetQASM is a universal, platform-independent and extendable instruction set with support for local quantum gates, powerful classical logic and quantum ...
A. Dahlberg+6 more
semanticscholar +1 more source
Instruction-Set Accelerated Implementation of CRYSTALS-Kyber
Large scale quantum computers will break classical public-key cryptography protocols by quantum algorithms such as Shor’s algorithm. Hence, designing quantum-safe cryptosystems to replace current classical algorithms is crucial.
Mojtaba Bisheh-Niasar+2 more
semanticscholar +1 more source
How Far Can Camels Go? Exploring the State of Instruction Tuning on Open Resources [PDF]
In this work we explore recent advances in instruction-tuning language models on a range of open instruction-following datasets. Despite recent claims that open models can be on par with state-of-the-art proprietary models, these claims are often ...
Yizhong Wang+10 more
semanticscholar +1 more source
Text-to-Audio Generation using Instruction-Tuned LLM and Latent Diffusion Model [PDF]
The immense scale of the recent large language models (LLM) allows many interesting properties, such as, instruction- and chain-of-thought-based fine-tuning, that has significantly improved zero- and few-shot performance in many natural language ...
Deepanway Ghosal+3 more
semanticscholar +1 more source
Software/Hardware Co-Verification for Custom Instruction Set Processors
Verification of software and processor hardware usually proceeds separately, software analysis relying on the correctness of processors executing machine instructions.
Marie-Christine Jakobs+4 more
doaj +1 more source
In this paper, we present an instruction set coprocessor architecture for lattice-based cryptography and implement the module lattice-based post-quantum key encapsulation mechanism (KEM) Saber as a case study.
S. Roy, Andrea Basso
semanticscholar +1 more source