Compact Dilithium Implementations on Cortex-M3 and Cortex-M4

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

All the AES You Need on Cortex-M3 and M4

This paper describes highly-optimized AES-{128, 192, 256}CTR assembly implementations for the popular ARM Cortex-M3 and M4 embedded microprocessors. These implementations are about twice as fast as existing implementations. Additionally, we provide the fastest bitsliced constant-time and masked implementations of AES-128-CTR to protect against timing attacks, power analysis and other (first-ord...

متن کامل

FIR Filtering on ARM Cortex-M3

This paper describes how to implement efficient FIR filters on ARM Cortex-M3 microprocessors. Two multiply-accumulate instructions are discussed: MLA – multiply with accumulate, using 32-bit operands and producing a 32-bit result, and SMLAL – signed multiply with accumulate, using 32-bit operands and producing a 64-bit result. There are advantages and disadvantages for each instruction. It is p...

متن کامل

Curve25519 for the Cortex-M4 and beyond

Institute of Computing – University of Campinas [email protected], [email protected] Abstract. We present techniques for the implementation of a key exchange protocol and digital signature scheme based on the Curve25519 elliptic curve and its Edwards form, respectively, in resource-constrained ARM devices. A possible application of this work consists of TLS deployments in the ARM ...

متن کامل

Effects of visual deprivation on synaptic plasticity of visual cortex

  TBS (Theta Burst Stimulation) and PBs (Primed Bursts) are among effective tetanic stimulations for induction of LTP in hippocampus. Recent studies have indicated that TBS is effective in LTP induction in layer III synapses of neocortex, only if applied to layer IV. However, the possibility of neocortical LTP induction using PBs, has not yet been investigated. Sensory deprivation greatly influ...

متن کامل

Micro-Architectural Power Simulator for Leakage Assessment of Cryptographic Software on ARM Cortex-M3 Processors

Masking is a common technique to protect software implementations of symmetric cryptographic algorithms against Differential Power Analysis (DPA) attacks. The development of a properly masked version of a block cipher is an incremental and time-consuming process since each iteration of the development cycle involves a costly leakage assessment. To achieve a high level of DPA resistance, the arc...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IACR Transactions on Cryptographic Hardware and Embedded Systems

سال: 2020

ISSN: 2569-2925

DOI: 10.46586/tches.v2021.i1.1-24