搜索结果: 1-9 共查到“知识库 embedded systems”相关记录9条 . 查询时间(0.076 秒)
XMSS and Embedded Systems - XMSS Hardware Accelerators for RISC-V
XMSS hash-based signatures post-quantum cryptography
2019/1/2
We describe a hardware-software co-design for the hash-based post-quantum signature scheme XMSS on a RISC-V embedded processor. We provide software optimizations for the XMSS reference implementation ...
Causing a device to incorrectly execute an instruction or store faulty data is well-known strategy for attacking cryptographic implementations on embedded systems. One technique to generate such fault...
The research on pairing-based cryptography brought forth
a wide range of protocols interesting for future embedded applications.
One significant obstacle for the widespread deployment of pairing-bas...
ECOS: An SOCP solver for embedded systems
Embedded cone solver second-order cone programming solver embedded applications
2015/8/7
In this paper, we describe the embedded conic solver (ECOS), an interior-point solver for second-order cone programming (SOCP) designed specifically for embedded applications. ECOS is written in low f...
In this paper, we describe the embedded conic solver (ECOS), an interior-point solver for second-order cone programming (SOCP) designed specifically for embedded applications. ECOS is written in low f...
Intentional and Unintentional Side-Channels in Embedded Systems
Hardware Trojans IP Protection Physical Unconable Functions Side-Channel Analysis Watermarking
2014/11/7
Side-channel attacks have become a very important and well-studied area in computer security. Traditionally, side-channels are unwanted byproducts of implementations that can be exploited by an attack...
Adaptive explicitly parallel instruction computing for embedded systems
adaptive EPIC instruction synthesis dynamic reconfiguration
2009/10/29
Reconfigurable hardware offers the embedded system s the potential for significant performance improvements by providing support for application—specific operations.Adaptive Explicitly Parallel Instru...
The paper discusses the hardware and software security requirements
in an embedded device that are involved in the transfer of secure digital data.
The paper gives an overview on the security proces...
Efficient Large Numbers Karatsuba-Ofman Multiplier Designs for Embedded Systems
finite field Karatsuba-Ofman long numbers multiplication mathematical model
2010/2/2
Long number multiplications (n ≥ 128-bit) are a
primitive in most cryptosystems. They can be performed better by
using Karatsuba-Ofman technique. This algorithm is easy to
parallelize on workstatio...