[HTML][HTML] A Review on Resource-Constrained Embedded Vision Systems-Based Tiny Machine Learning for Robotic Applications

M Beltrán-Escobar, TE Alarcón, JY Rumbo-Morales… - Algorithms, 2024 - mdpi.com
The evolution of low-cost embedded systems is growing exponentially; likewise, their use in
robotics applications aims to achieve critical task execution by implementing sophisticated …

Parallel Implementations of ARIA on ARM Processors and Graphics Processing Unit

S Eum, H Kim, H Kwon, M Sim, G Song, H Seo - Applied Sciences, 2022 - mdpi.com
The ARIA block cipher algorithm is Korean standard, IETF standard (RFC 5794), and part of
the TLS/SSL protocol. In this paper, we present the parallel implementation of ARIA block …

Implementation of SM4 block cipher on CUDA GPU and its analysis

SW Eum, HJ Kim, HD Kwon, KB Jang… - 2022 International …, 2022 - ieeexplore.ieee.org
SM4 is a symmetric key algorithm developed by the China National Cryptographic Authority.
In this paper, the parallel implementation of SM4 block cipher commonly used in China was …

Look-up the Rainbow: Table-based Implementation of Rainbow Signature on 64-bit ARMv8 Processors

H Kwon, H Kim, M Sim, WK Lee, H Seo - ACM Transactions on …, 2023 - dl.acm.org
The Rainbow Signature Scheme is one of the finalists in the National Institute of Standards
and Technology (NIST) Post-Quantum Cryptography (PQC) standardization competition, but …

AVX-based Acceleration of ARIA Block Cipher Algorithm

TH Yoo, J Kivilinna, CH Cho - IEEE Access, 2023 - ieeexplore.ieee.org
Block cipher algorithms encrypt sensitive personal, financial, and confidential information to
prevent unauthorized access. The ARIA is a general block cipher algorithm with an …

ProbeShooter: A New Practical Approach for Probe Aiming

D Bae, S Park, M Choi, YG Jung, C Jeong… - Cryptology ePrint …, 2025 - eprint.iacr.org
Electromagnetic side-channel analysis is a powerful method for monitoring processor
activity and compromising cryptographic systems in air-gapped environments. As analytical …

Optimized Implementation of Simpira on Microcontrollers for Secure Massive Learning

M Sim, S Eum, H Kwon, K Jang, H Kim, H Kim, G Song… - Symmetry, 2022 - mdpi.com
Internet of Things (IoT) technology, in which numerous devices cooperate, has a significant
impact on existing industries, such as smart factories, smart cars, and smart cities. Massive …

MRCA: Multi-grained Reconfigurable Cryptographic Accelerator for Diverse Security Requirements

PH Luan, HH Nguyen, VTD Le, TD Tran… - … IEEE Symposium in …, 2024 - ieeexplore.ieee.org
In today's digital security, the robust 64-bit cryptographic algorithms are key to fulfilling strict
security standards. However, most existing cryptographic architectures primarily support …

认证加密算法SM4-GCM 的低成本硬件架构设计与实现

陈锐, 李春强 - 物联网学报 - infocomm-journal.com
物联网已被广泛应用于各行各业, 该项技术的赋能使得行业应用更好地向数字化,
智能化方向发展. 在一些行业应用中, 物联网设备采集的数据与用户隐私和财产安全关系密切 …

Performance Evaluation of Block Cipher Algorithms Implementations in ARM Architecture

LL Hernández, AP Cabrera, MDP Priego… - 2024 International …, 2024 - ieeexplore.ieee.org
Since the arrival of devices connected to the Internet, cryptographic goals have become a
constant challenge for cybersecurity specialists. Data transmitted between IoT devices can …