>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到知识库 arm相关记录168条 . 查询时间(0.241 秒)
中国科学院合肥物质科学研究院专利:一种基于ARM 平台的模块化步进电机控制器。
通过引入PTP精密时间协议并分析其工作原理,基于ARM(STM32F407)芯片及其相关的外围电路设计了时钟同步与触发单元(MAC层获取硬件时间戳),进而通过相关软件(包括时钟同步软件,TCP/IP协议栈移植等)设计从而实现分布式测试系统的时钟同步。大量相关实验(两时钟节点网线直连,两节点交换机相连,定时触发输出等)结果表明:组网的各时钟同步与触发单元实现了亚微秒级时钟同步精度和精确同步触发功能。...
This paper presents pqm4 – a testing and benchmarking framework for the ARM Cortex-M4. It makes use of a widely available discovery board with 196 KiB of memory and 1 MiB flash ROM. It currently inclu...
In this work, we present the rst highly-optimized implementation of Supersingular Isogeny Key Encapsulation (SIKE) submitted to NIST's second round of post quantum standardization process, on 64-bit ...
We present the first practical software implementation of Supersingular Isogeny Key Encapsulation (SIKE) round 2, targeting NIST’s 1, 2, and 5 security levels on 32-bit ARM Cortex-M4 microcontrollers....
通过建立空地反辐射导弹单发毁伤概率计算模型,分析导弹无效杀伤区域,计算出存在系统误差时的单发毁伤概率。实例分析表明,系统误差会降低破片式单发毁伤概率,但随着误差增大,降低速度减小。该结论可以为破片式空地反辐射导弹作战使用和研发提供一定的参考。
We present an efficient implementation of FrodoKEM-640 on an ARM Cortex-M4 core. We leverage the single instruction, multiple data paradigm, available in the instruction set of the ARM Cortex-M4, toge...
Servers with many cores cost a lot of money and consume large amounts of energy. The developments in hardware for mobile devices has resulted in a surge in relatively cheap, powerful, and low-energy C...
We present high-speed implementations of the post-quantum supersingular isogeny Diffie-Hellman key exchange (SIDH) and the supersingular isogeny key encapsulation (SIKE) protocols for 32-bit ARMv7-A p...
The CCA-secure lattice-based post-quantum key encapsulation scheme Saber is a candidate in the NIST's post-quantum cryptography standardization process. In this paper, we study the implementation aspe...
The ARM TrustZone is a security extension which is used in recent Samsung flagship smartphones to create a Trusted Execution Environment (TEE) called a Secure World, which runs secure processes (Trust...
Masking is a common technique to protect software implementations of symmetric cryptographic algorithms against Differential Power Analysis (DPA) attacks. The development of a properly masked version ...
Background: In clinical settings, wasting in childhood has primarily been assessed with the use of a weight-for-height z score (WHZ), and in community settings, it has been assessed via the midupper a...
Recently, Alkim, Ducas, P鰌pelmann, and Schwabe proposed a Ring-LWE-based key exchange protocol called "NewHope" (Usenix Security'16) and illustrated that this protocol is very effcient on large Intel ...
Bitsliced Masking and ARM: Friends or Foes?     PRESENT  ARM  masking       2016/12/8
Software-based cryptographic implementations can be vulnerable to side-channel analysis. Masking countermeasures rank among the most prevalent techniques against it, ensuring formally the protection v...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...