[HTML][HTML] A Review on Resource-Constrained Embedded Vision Systems-Based Tiny Machine Learning for Robotic Applications
The evolution of low-cost embedded systems is growing exponentially; likewise, their use in
robotics applications aims to achieve critical task execution by implementing sophisticated …
robotics applications aims to achieve critical task execution by implementing sophisticated …
Parallel Implementations of ARIA on ARM Processors and Graphics Processing Unit
The ARIA block cipher algorithm is Korean standard, IETF standard (RFC 5794), and part of
the TLS/SSL protocol. In this paper, we present the parallel implementation of ARIA block …
the TLS/SSL protocol. In this paper, we present the parallel implementation of ARIA block …
Implementation of SM4 block cipher on CUDA GPU and its analysis
SM4 is a symmetric key algorithm developed by the China National Cryptographic Authority.
In this paper, the parallel implementation of SM4 block cipher commonly used in China was …
In this paper, the parallel implementation of SM4 block cipher commonly used in China was …
Look-up the Rainbow: Table-based Implementation of Rainbow Signature on 64-bit ARMv8 Processors
The Rainbow Signature Scheme is one of the finalists in the National Institute of Standards
and Technology (NIST) Post-Quantum Cryptography (PQC) standardization competition, but …
and Technology (NIST) Post-Quantum Cryptography (PQC) standardization competition, but …
AVX-based Acceleration of ARIA Block Cipher Algorithm
TH Yoo, J Kivilinna, CH Cho - IEEE Access, 2023 - ieeexplore.ieee.org
Block cipher algorithms encrypt sensitive personal, financial, and confidential information to
prevent unauthorized access. The ARIA is a general block cipher algorithm with an …
prevent unauthorized access. The ARIA is a general block cipher algorithm with an …
ProbeShooter: A New Practical Approach for Probe Aiming
D Bae, S Park, M Choi, YG Jung, C Jeong… - Cryptology ePrint …, 2025 - eprint.iacr.org
Electromagnetic side-channel analysis is a powerful method for monitoring processor
activity and compromising cryptographic systems in air-gapped environments. As analytical …
activity and compromising cryptographic systems in air-gapped environments. As analytical …
Optimized Implementation of Simpira on Microcontrollers for Secure Massive Learning
Internet of Things (IoT) technology, in which numerous devices cooperate, has a significant
impact on existing industries, such as smart factories, smart cars, and smart cities. Massive …
impact on existing industries, such as smart factories, smart cars, and smart cities. Massive …
MRCA: Multi-grained Reconfigurable Cryptographic Accelerator for Diverse Security Requirements
In today's digital security, the robust 64-bit cryptographic algorithms are key to fulfilling strict
security standards. However, most existing cryptographic architectures primarily support …
security standards. However, most existing cryptographic architectures primarily support …
Performance Evaluation of Block Cipher Algorithms Implementations in ARM Architecture
LL Hernández, AP Cabrera, MDP Priego… - 2024 International …, 2024 - ieeexplore.ieee.org
Since the arrival of devices connected to the Internet, cryptographic goals have become a
constant challenge for cybersecurity specialists. Data transmitted between IoT devices can …
constant challenge for cybersecurity specialists. Data transmitted between IoT devices can …
Optimizing the SM4 Encryption Algorithm for Blockchain Security
X Hu, H Yi, W Zhang, Y Du - CCF China Blockchain Conference, 2023 - Springer
Encryption algorithms play a critical role in ensuring data security. However, challenges
such as slow operation and suboptimal efficiency arise during the encryption and decryption …
such as slow operation and suboptimal efficiency arise during the encryption and decryption …