搜索结果: 1-13 共查到“embedded systems”相关记录13条 . 查询时间(0.048 秒)
XMSS and Embedded Systems - XMSS Hardware Accelerators for RISC-V
XMSS hash-based signatures post-quantum cryptography
2019/1/2
We describe a hardware-software co-design for the hash-based post-quantum signature scheme XMSS on a RISC-V embedded processor. We provide software optimizations for the XMSS reference implementation ...
2017第12届IEEE国际工业嵌入式系统研讨会(2017 12th IEEE International Symposium on Industrial Embedded Systems)
2017 第12届 IEEE 国际工业 嵌入式系统 研讨会
2017/5/22
Application domains have had a considerable impact on the evolution of embedded systems, in terms of required methodologies and supporting tools and resulting technologies. SoCs are making inroads in ...
2017第四届国际电力,控制与嵌入式系统会议(2017 4th International Conference on Power, Control & Embedded Systems)
2017 国际电力 控制与嵌入式系统 会议
2017/2/14
The Department of Electrical Engineering, MNNIT Allahabad has successfully organized three successive conferences titled "International Conference on Power, Control & Embedded Systems (ICPCES-2010, IC...
Causing a device to incorrectly execute an instruction or store faulty data is well-known strategy for attacking cryptographic implementations on embedded systems. One technique to generate such fault...
The research on pairing-based cryptography brought forth
a wide range of protocols interesting for future embedded applications.
One significant obstacle for the widespread deployment of pairing-bas...
ECOS: An SOCP solver for embedded systems
Embedded cone solver second-order cone programming solver embedded applications
2015/8/7
In this paper, we describe the embedded conic solver (ECOS), an interior-point solver for second-order cone programming (SOCP) designed specifically for embedded applications. ECOS is written in low f...
In this paper, we describe the embedded conic solver (ECOS), an interior-point solver for second-order cone programming (SOCP) designed specifically for embedded applications. ECOS is written in low f...
Intentional and Unintentional Side-Channels in Embedded Systems
Hardware Trojans IP Protection Physical Unconable Functions Side-Channel Analysis Watermarking
2014/11/7
Side-channel attacks have become a very important and well-studied area in computer security. Traditionally, side-channels are unwanted byproducts of implementations that can be exploited by an attack...
2010 IEEE/ASME International Conference on Mechatronic and Embedded Systems and Applications
2010 IEEE/ASME Conference Mechatronic Embedded Systems
2010/1/29
Mechanical and electrical engineering show an increasing integration of mechanics with electronics and information processing. This integration is between the components (hardware) and the information...
Adaptive explicitly parallel instruction computing for embedded systems
adaptive EPIC instruction synthesis dynamic reconfiguration
2009/10/29
Reconfigurable hardware offers the embedded system s the potential for significant performance improvements by providing support for application—specific operations.Adaptive Explicitly Parallel Instru...
The paper discusses the hardware and software security requirements
in an embedded device that are involved in the transfer of secure digital data.
The paper gives an overview on the security proces...
Efficient Large Numbers Karatsuba-Ofman Multiplier Designs for Embedded Systems
finite field Karatsuba-Ofman long numbers multiplication mathematical model
2010/2/2
Long number multiplications (n ≥ 128-bit) are a
primitive in most cryptosystems. They can be performed better by
using Karatsuba-Ofman technique. This algorithm is easy to
parallelize on workstatio...
Consortium for Embedded Systems sets stage to make global impact
Computer Science Engineering Embedded Systems
2007/3/5