Results 51 to 60 of about 21,625 (285)
The design of scalar AES Instruction Set Extensions for RISC-V
Secure, efficient execution of AES is an essential requirement on most computing platforms. Dedicated Instruction Set Extensions (ISEs) are often included for this purpose. RISC-V is a (relatively) new ISA that lacks such a standardized ISE.
Ben Marshall +4 more
doaj +3 more sources
RISC-V for genome data analysis: opportunities and challenges [PDF]
The RISC-V ISA has gained significant momentum in High-Performance Computing (HPC) research and market due to its open-source nature, fostering collaborative research and innovation.
Alastruey Benedé, Jesús +6 more
core +1 more source
Taking on RISC for Energy-Efficient Computing in HEP [PDF]
In pursuit of energy-efficient solutions for computing in High Energy Physics (HEP) we have extended our investigations of non-x86 architectures beyond the ARM platforms that we have previously studied. In this work, we have taken a first look at the RISC-V
Simili Emanuele +6 more
doaj +1 more source
Optimized Implementation of PIPO Block Cipher on 32-Bit ARM and RISC-V Processors
A lightweight block cipher PIPO-64/128 was presented in ICISC’2020. PIPO of the 8-bit unit using an unbalanced-bridge S-box showed better performance than other lightweight block cipher algorithms on an 8-bit AVR environment.
Youngbeom Kim, Seog Chung Seo
doaj +1 more source
Code trolley: hardware-assisted control flow obfuscation [PDF]
Many cybersecurity attacks rely on analyzing a binary executable to find exploitable sections of code. Code obfuscation is used to prevent attackers from reverse engineering these executables.
Boskov, Novak +2 more
core +2 more sources
Security, Reliability and Test Aspects of the RISC-V Ecosystem [PDF]
RISC-V has emerged as a viable solution on academia and industry. However, to use open source hardware for safety-critical applications, we need a deep understanding of the way in which well established mechanisms for testing and reliability could be integrated and deployed on the RISCV ecosystem, and we need a clear knowledge on how such an ecosystem ...
Abella Ferrer, Jaume +15 more
openaire +5 more sources
An ultra-low-power processor pipeline-structure
With the rapid development of communication and chip technology, IoT will be an important part of the next generation of information technology, a powerful driving force to promote the intelligent process of our lives. Among the IoT terminal applications,
Deng Tianchuan, Hu Zhenbo
doaj +1 more source
RISC-V: #AlphanumericShellcoding
25 pages, originally published at WOOT ...
Barral, Hadrien +3 more
openaire +2 more sources
BRISC-V emulator: a standalone, installation-free, browser-based teaching tool [PDF]
Many computer organization and computer architecture classes have recently started adopting the RISC-V architecture as an alternative to proprietary RISC ISAs and architectures.
Isakov, Mihailo, Kinsy, Michel A.
core
ChaCha20–Poly1305 Authenticated Encryption with Additional Data for Transport Layer Security 1.3
Transport Layer Security (TLS) provides a secure channel for end-to-end communications in computer networks. The ChaCha20–Poly1305 cipher suite is introduced in TLS 1.3, mitigating the sidechannel attacks in the cipher suites based on the Advanced ...
Ronaldo Serrano +4 more
doaj +1 more source

