Results 51 to 60 of about 21,625 (285)

The design of scalar AES Instruction Set Extensions for RISC-V

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
Secure, efficient execution of AES is an essential requirement on most computing platforms. Dedicated Instruction Set Extensions (ISEs) are often included for this purpose. RISC-V is a (relatively) new ISA that lacks such a standardized ISE.
Ben Marshall   +4 more
doaj   +3 more sources

RISC-V for genome data analysis: opportunities and challenges [PDF]

open access: yes, 2023
The RISC-V ISA has gained significant momentum in High-Performance Computing (HPC) research and market due to its open-source nature, fostering collaborative research and innovation.
Alastruey Benedé, Jesús   +6 more
core   +1 more source

Taking on RISC for Energy-Efficient Computing in HEP [PDF]

open access: yesEPJ Web of Conferences
In pursuit of energy-efficient solutions for computing in High Energy Physics (HEP) we have extended our investigations of non-x86 architectures beyond the ARM platforms that we have previously studied. In this work, we have taken a first look at the RISC-V
Simili Emanuele   +6 more
doaj   +1 more source

Optimized Implementation of PIPO Block Cipher on 32-Bit ARM and RISC-V Processors

open access: yesIEEE Access, 2022
A lightweight block cipher PIPO-64/128 was presented in ICISC’2020. PIPO of the 8-bit unit using an unbalanced-bridge S-box showed better performance than other lightweight block cipher algorithms on an 8-bit AVR environment.
Youngbeom Kim, Seog Chung Seo
doaj   +1 more source

Code trolley: hardware-assisted control flow obfuscation [PDF]

open access: yes, 2020
Many cybersecurity attacks rely on analyzing a binary executable to find exploitable sections of code. Code obfuscation is used to prevent attackers from reverse engineering these executables.
Boskov, Novak   +2 more
core   +2 more sources

Security, Reliability and Test Aspects of the RISC-V Ecosystem [PDF]

open access: yes2021 IEEE European Test Symposium (ETS), 2021
RISC-V has emerged as a viable solution on academia and industry. However, to use open source hardware for safety-critical applications, we need a deep understanding of the way in which well established mechanisms for testing and reliability could be integrated and deployed on the RISCV ecosystem, and we need a clear knowledge on how such an ecosystem ...
Abella Ferrer, Jaume   +15 more
openaire   +5 more sources

An ultra-low-power processor pipeline-structure

open access: yesDianzi Jishu Yingyong, 2019
With the rapid development of communication and chip technology, IoT will be an important part of the next generation of information technology, a powerful driving force to promote the intelligent process of our lives. Among the IoT terminal applications,
Deng Tianchuan, Hu Zhenbo
doaj   +1 more source

RISC-V: #AlphanumericShellcoding

open access: yes, 2019
25 pages, originally published at WOOT ...
Barral, Hadrien   +3 more
openaire   +2 more sources

BRISC-V emulator: a standalone, installation-free, browser-based teaching tool [PDF]

open access: yes, 2020
Many computer organization and computer architecture classes have recently started adopting the RISC-V architecture as an alternative to proprietary RISC ISAs and architectures.
Isakov, Mihailo, Kinsy, Michel A.
core  

ChaCha20–Poly1305 Authenticated Encryption with Additional Data for Transport Layer Security 1.3

open access: yesCryptography, 2022
Transport Layer Security (TLS) provides a secure channel for end-to-end communications in computer networks. The ChaCha20–Poly1305 cipher suite is introduced in TLS 1.3, mitigating the sidechannel attacks in the cipher suites based on the Advanced ...
Ronaldo Serrano   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy