Results 71 to 80 of about 9,109,748 (351)
TriCheck: Memory Model Verification at the Trisection of Software, Hardware, and ISA
Memory consistency models (MCMs) which govern inter-module interactions in a shared memory system, are a significant, yet often under-appreciated, aspect of system design.
Collier William W.+5 more
core +1 more source
A RISC-V Processor Designed For Security [PDF]
A microprocessor is as secure as its weakest module. Depending on the application, the weakest module may be present in the hardware, micro-architecture, or a vulnerability in the software. For instance in a web-server, the biggest threats occur due to software vulnerabilities and due to information leakage in shared micro-architecture components.
Vinod Ganesan+9 more
openaire +1 more source
Optimized Software Implementation of Keccak, Kyber, and Dilithium on RV{32,64}IM{B}{V}
With the standardization of NIST post-quantum cryptographic (PQC) schemes, optimizing these PQC schemes across various platforms presents significant research value. While most existing software implementation efforts have concentrated on ARM platforms,
Jipeng Zhang+3 more
doaj +1 more source
RISC-V3: A RISC-V Compatible CPU With a Data Path Based on Redundant Number Systems
Redundant number systems (RNS) are a well-known technique to speed up arithmetic circuits. However, in a complete CPU, arithmetic circuits using RNS were only included on subcircuit level e.g. inside the Arithmetic Logic Unit (ALU) for realization of the
Marc Reichenbach+3 more
doaj +1 more source
Evolutionary interplay between viruses and R‐loops
Viruses interact with specialized nucleic acid structures called R‐loops to influence host transcription, epigenetic states, latency, and immune evasion. This Perspective examines the roles of R‐loops in viral replication, integration, and silencing, and how viruses co‐opt or avoid these structures.
Zsolt Karányi+4 more
wiley +1 more source
A buffer overflow detection and defense method based on RISC-V instruction set extension
Buffer overflow poses a serious threat to the memory security of modern operating systems. It overwrites the contents of other memory areas by breaking through the buffer capacity limit, destroys the system execution environment, and provides ...
Chang Liu+3 more
doaj +1 more source
Glycosylation Gene Signatures as Prognostic Biomarkers in Glioblastoma
ABSTRACT Objective Glioblastoma (GBM) is an aggressive brain tumor characterized by significant heterogeneity. This study investigates the role of glycosylation‐related genes in GBM subtyping, prognosis, and response to therapy. Methods We analyzed mRNA expression data and clinical information from The Cancer Genome Atlas (TCGA) and Gene Expression ...
Tong Zhao+4 more
wiley +1 more source
Implementation and integration of Keccak accelerator on RISC-V for CRYSTALS-Kyber
One of the key metrics used for defying the security of the Internet of Things (IoT) is data integrity, which mostly relies on the use of cryptographic hash functions. In the last years, the National Institute of Standards and Technology (NIST) announced
Alessandra Dolmeta+3 more
semanticscholar +1 more source
Objective This study aimed to identify themes contributing to resilience in childhood‐onset systemic lupus erythematosus (cSLE), distinguish between profiles of resilience, and examine how they relate to underlying themes and patient characteristics. Methods We conducted a mixed‐methods study of 21 patients with cSLE aged 11 to 19 years at a Canadian ...
Isabella Zaffino+12 more
wiley +1 more source
Carbon Nanotube 3D Integrated Circuits: From Design to Applications
As Moore's law approaches its physical limits, carbon nanotube (CNT) 3D integrated circuits (ICs) emerge as a promising alternative due to the miniaturization, high mobility, and low power consumption. CNT 3D ICs in optoelectronics, memory, and monolithic ICs are reviewed while addressing challenges in fabrication, design, and integration.
Han‐Yang Liu+3 more
wiley +1 more source