Results 71 to 80 of about 9,109,748 (351)

TriCheck: Memory Model Verification at the Trisection of Software, Hardware, and ISA

open access: yes, 2017
Memory consistency models (MCMs) which govern inter-module interactions in a shared memory system, are a significant, yet often under-appreciated, aspect of system design.
Collier William W.   +5 more
core   +1 more source

A RISC-V Processor Designed For Security [PDF]

open access: yesAdvanced Computing and Communications, 2019
A microprocessor is as secure as its weakest module. Depending on the application, the weakest module may be present in the hardware, micro-architecture, or a vulnerability in the software. For instance in a web-server, the biggest threats occur due to software vulnerabilities and due to information leakage in shared micro-architecture components.
Vinod Ganesan   +9 more
openaire   +1 more source

Optimized Software Implementation of Keccak, Kyber, and Dilithium on RV{32,64}IM{B}{V}

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
With the standardization of NIST post-quantum cryptographic (PQC) schemes, optimizing these PQC schemes across various platforms presents significant research value. While most existing software implementation efforts have concentrated on ARM platforms,
Jipeng Zhang   +3 more
doaj   +1 more source

RISC-V3: A RISC-V Compatible CPU With a Data Path Based on Redundant Number Systems

open access: yesIEEE Access, 2021
Redundant number systems (RNS) are a well-known technique to speed up arithmetic circuits. However, in a complete CPU, arithmetic circuits using RNS were only included on subcircuit level e.g. inside the Arithmetic Logic Unit (ALU) for realization of the
Marc Reichenbach   +3 more
doaj   +1 more source

Evolutionary interplay between viruses and R‐loops

open access: yesFEBS Letters, EarlyView.
Viruses interact with specialized nucleic acid structures called R‐loops to influence host transcription, epigenetic states, latency, and immune evasion. This Perspective examines the roles of R‐loops in viral replication, integration, and silencing, and how viruses co‐opt or avoid these structures.
Zsolt Karányi   +4 more
wiley   +1 more source

A buffer overflow detection and defense method based on RISC-V instruction set extension

open access: yesCybersecurity, 2023
Buffer overflow poses a serious threat to the memory security of modern operating systems. It overwrites the contents of other memory areas by breaking through the buffer capacity limit, destroys the system execution environment, and provides ...
Chang Liu   +3 more
doaj   +1 more source

Glycosylation Gene Signatures as Prognostic Biomarkers in Glioblastoma

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Glioblastoma (GBM) is an aggressive brain tumor characterized by significant heterogeneity. This study investigates the role of glycosylation‐related genes in GBM subtyping, prognosis, and response to therapy. Methods We analyzed mRNA expression data and clinical information from The Cancer Genome Atlas (TCGA) and Gene Expression ...
Tong Zhao   +4 more
wiley   +1 more source

Implementation and integration of Keccak accelerator on RISC-V for CRYSTALS-Kyber

open access: yesACM International Conference on Computing Frontiers, 2023
One of the key metrics used for defying the security of the Internet of Things (IoT) is data integrity, which mostly relies on the use of cryptographic hash functions. In the last years, the National Institute of Standards and Technology (NIST) announced
Alessandra Dolmeta   +3 more
semanticscholar   +1 more source

Understanding Contributors of Resilience in Youth With Childhood‐Onset Systemic Lupus Erythematosus Through a Socioecological Lens: A Mixed‐Methods Study

open access: yesArthritis Care &Research, EarlyView.
Objective This study aimed to identify themes contributing to resilience in childhood‐onset systemic lupus erythematosus (cSLE), distinguish between profiles of resilience, and examine how they relate to underlying themes and patient characteristics. Methods We conducted a mixed‐methods study of 21 patients with cSLE aged 11 to 19 years at a Canadian ...
Isabella Zaffino   +12 more
wiley   +1 more source

Carbon Nanotube 3D Integrated Circuits: From Design to Applications

open access: yesAdvanced Functional Materials, EarlyView.
As Moore's law approaches its physical limits, carbon nanotube (CNT) 3D integrated circuits (ICs) emerge as a promising alternative due to the miniaturization, high mobility, and low power consumption. CNT 3D ICs in optoelectronics, memory, and monolithic ICs are reviewed while addressing challenges in fabrication, design, and integration.
Han‐Yang Liu   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy