搜索结果: 1-15 共查到“军事学 ARM”相关记录25条 . 查询时间(0.125 秒)
This paper presents pqm4 – a testing and benchmarking framework for the ARM Cortex-M4. It makes use of a widely available discovery board with 196 KiB of memory and 1 MiB flash ROM. It currently inclu...
Optimized SIKE Round 2 on 64-bit ARM
Post-quantum cryptography isogeny-based cryptography 64-bit ARM processor
2019/6/19
In this work, we present the rst highly-optimized implementation of Supersingular Isogeny Key Encapsulation (SIKE) submitted to NIST's second round of post quantum standardization process, on 64-bit ...
SIKE Round 2 Speed Record on ARM Cortex-M4
Post-quantum cryptography SIKE key encapsulation mechanism
2019/5/23
We present the first practical software implementation of Supersingular Isogeny Key Encapsulation (SIKE) round 2, targeting NIST’s 1, 2, and 5 security levels on 32-bit ARM Cortex-M4 microcontrollers....
We present an efficient implementation of FrodoKEM-640 on an ARM Cortex-M4 core. We leverage the single instruction, multiple data paradigm, available in the instruction set of the ARM Cortex-M4, toge...
Energy-Efficient ARM64 Cluster with Cryptanalytic Applications: 80 Cores That Do Not Cost You an ARM and a Leg
ARM compute cluster cyptanalysis
2018/11/9
Servers with many cores cost a lot of money and consume large amounts of energy. The developments in hardware for mobile devices has resulted in a surge in relatively cheap, powerful, and low-energy C...
SIDH on ARM: Faster Modular Multiplications for Faster Post-Quantum Supersingular Isogeny Key Exchange
Post-quantum cryptography SIDH SIKE
2018/8/2
We present high-speed implementations of the post-quantum supersingular isogeny Diffie-Hellman key exchange (SIDH) and the supersingular isogeny key encapsulation (SIKE) protocols for 32-bit ARMv7-A p...
Saber on ARM CCA-secure module lattice-based key encapsulation on ARM
Key encapsulation scheme post-quantum cryptography lattice-based cryptography
2018/7/17
The CCA-secure lattice-based post-quantum key encapsulation scheme Saber is a candidate in the NIST's post-quantum cryptography standardization process. In this paper, we study the implementation aspe...
Cache-Attacks on the ARM TrustZone implementations of AES-256 and AES-256-GCM via GPU-based analysis
side-channel cache attacks
2018/6/25
The ARM TrustZone is a security extension which is used in recent Samsung flagship smartphones to create a Trusted Execution Environment (TEE) called a Secure World, which runs secure processes (Trust...
Micro-Architectural Power Simulator for Leakage Assessment of Cryptographic Software on ARM Cortex-M3 Processors
implementation side-channel attacks
2018/1/2
Masking is a common technique to protect software implementations of symmetric cryptographic algorithms against Differential Power Analysis (DPA) attacks. The development of a properly masked version ...
Recently, Alkim, Ducas, P鰌pelmann, and Schwabe proposed a Ring-LWE-based key exchange protocol called "NewHope" (Usenix Security'16) and illustrated that this protocol is very effcient on large Intel ...
Software-based cryptographic implementations can be vulnerable to side-channel analysis. Masking countermeasures rank among the most prevalent techniques against it, ensuring formally the protection v...
TruSpy: Cache Side-Channel Information Leakage from the Secure World on ARM Devices
side channel attack cache TrustZone
2016/12/8
As smart, embedded devices are increasingly integrated into our daily life, the security of these devices has become a major concern. The ARM processor family, which powers more than 60% of embedded d...
NEON-SIDH: Efficient Implementation of Supersingular Isogeny Diffie-Hellman Key-Exchange Protocol on ARM
Elliptic curve cryptography post-quantum cryptography isogeny-based cryptosystems
2016/7/5
In this paper, we investigate the efficiency of implementing a post-quantum key-exchange protocol over isogenies (PQCrypto 2011) on ARM-powered embedded platforms. We propose to employ new primes to s...
FourQNEON: Faster Elliptic Curve Scalar Multiplications on ARM Processors
Elliptic curves FourQ ARM
2016/6/27
We present a high-speed, high-security implementation of the recently proposed elliptic
curve FourQ (ASIACRYPT 2015) for 32-bit ARM processors with NEON support. Exploiting
the versatile and compact...
ELMO: Emulating Leaks for the ARM Cortex-M0 without Access to a Side Channel Lab
leakage evaluation side-channel embedded systems
2016/5/30
Power (as well as EM, cache and timing) leaks are a great
cause for concern for developers who have to deal with cryptographic
components as part of their overall software implementation,
in partic...