搜索结果: 1-15 共查到“知识库 arm”相关记录168条 . 查询时间(0.241 秒)
通过引入PTP精密时间协议并分析其工作原理,基于ARM(STM32F407)芯片及其相关的外围电路设计了时钟同步与触发单元(MAC层获取硬件时间戳),进而通过相关软件(包括时钟同步软件,TCP/IP协议栈移植等)设计从而实现分布式测试系统的时钟同步。大量相关实验(两时钟节点网线直连,两节点交换机相连,定时触发输出等)结果表明:组网的各时钟同步与触发单元实现了亚微秒级时钟同步精度和精确同步触发功能。...
This paper presents pqm4 – a testing and benchmarking framework for the ARM Cortex-M4. It makes use of a widely available discovery board with 196 KiB of memory and 1 MiB flash ROM. It currently inclu...
Optimized SIKE Round 2 on 64-bit ARM
Post-quantum cryptography isogeny-based cryptography 64-bit ARM processor
2019/6/19
In this work, we present the rst highly-optimized implementation of Supersingular Isogeny Key Encapsulation (SIKE) submitted to NIST's second round of post quantum standardization process, on 64-bit ...
SIKE Round 2 Speed Record on ARM Cortex-M4
Post-quantum cryptography SIKE key encapsulation mechanism
2019/5/23
We present the first practical software implementation of Supersingular Isogeny Key Encapsulation (SIKE) round 2, targeting NIST’s 1, 2, and 5 security levels on 32-bit ARM Cortex-M4 microcontrollers....
破片式ARM杀伤域分析及单发毁伤概率研究
空地反辐射导弹 破片式战斗部 单发毁伤概率 杀伤区域
2020/3/27
通过建立空地反辐射导弹单发毁伤概率计算模型,分析导弹无效杀伤区域,计算出存在系统误差时的单发毁伤概率。实例分析表明,系统误差会降低破片式单发毁伤概率,但随着误差增大,降低速度减小。该结论可以为破片式空地反辐射导弹作战使用和研发提供一定的参考。
We present an efficient implementation of FrodoKEM-640 on an ARM Cortex-M4 core. We leverage the single instruction, multiple data paradigm, available in the instruction set of the ARM Cortex-M4, toge...
Energy-Efficient ARM64 Cluster with Cryptanalytic Applications: 80 Cores That Do Not Cost You an ARM and a Leg
ARM compute cluster cyptanalysis
2018/11/9
Servers with many cores cost a lot of money and consume large amounts of energy. The developments in hardware for mobile devices has resulted in a surge in relatively cheap, powerful, and low-energy C...
SIDH on ARM: Faster Modular Multiplications for Faster Post-Quantum Supersingular Isogeny Key Exchange
Post-quantum cryptography SIDH SIKE
2018/8/2
We present high-speed implementations of the post-quantum supersingular isogeny Diffie-Hellman key exchange (SIDH) and the supersingular isogeny key encapsulation (SIKE) protocols for 32-bit ARMv7-A p...
Saber on ARM CCA-secure module lattice-based key encapsulation on ARM
Key encapsulation scheme post-quantum cryptography lattice-based cryptography
2018/7/17
The CCA-secure lattice-based post-quantum key encapsulation scheme Saber is a candidate in the NIST's post-quantum cryptography standardization process. In this paper, we study the implementation aspe...
Cache-Attacks on the ARM TrustZone implementations of AES-256 and AES-256-GCM via GPU-based analysis
side-channel cache attacks
2018/6/25
The ARM TrustZone is a security extension which is used in recent Samsung flagship smartphones to create a Trusted Execution Environment (TEE) called a Secure World, which runs secure processes (Trust...
Micro-Architectural Power Simulator for Leakage Assessment of Cryptographic Software on ARM Cortex-M3 Processors
implementation side-channel attacks
2018/1/2
Masking is a common technique to protect software implementations of symmetric cryptographic algorithms against Differential Power Analysis (DPA) attacks. The development of a properly masked version ...
Comparison of midupper arm circumference and weight-for-height z score for assessing acute malnutrition in Bangladeshi children aged 6–60 mo: an analytical study
community-based management of acute malnutrition detection of malnutrition in children aged <5 y midupper arm circumference wasting weight-for-height z score
2018/11/20
Background: In clinical settings, wasting in childhood has primarily been assessed with the use of a weight-for-height z score (WHZ), and in community settings, it has been assessed via the midupper a...
Recently, Alkim, Ducas, P鰌pelmann, and Schwabe proposed a Ring-LWE-based key exchange protocol called "NewHope" (Usenix Security'16) and illustrated that this protocol is very effcient on large Intel ...