Performance Analysis of Encryption Capabilities of ARM-based Single Board Microcomputers

S Répás - Infocommunications Journal, 2023 - real.mtak.hu
In the few years since the Raspberry Pi was released in 2012, countless microcomputers
based on the ARM architecture have been introduced. Their small size, high performance …

[PDF][PDF] Performance of State-of-the-Art Cryptography on ARM-based Microprocessors

H Tschofenig… - NIST Lightweight …, 2015 - raw.githubusercontent.com
1) Cortex-A: Application processors that are designed to handle complex applications, such
as high-end embedded operating systems. Example products include high-end smart …

Evaluating cryptographic performance of Raspberry Pi clusters

D Hawthorne, M Kapralos, RW Blaine… - 2020 IEEE High …, 2020 - ieeexplore.ieee.org
ARM-based single board computers (SBCs) such as the Raspberry Pi capture the
imaginations of hobbyists and scientists due to their low cost and versatility. With the deluge …

Efficient implementation of Advanced Encryption Standard (AES) for ARM based platforms

M Kumar, A Singhal - 2012 1st International Conference on …, 2012 - ieeexplore.ieee.org
Now a days, hi-tech secure products need more services and more security. Furthermore,
the corresponding market is now oriented towards more flexibility. In this paper, we have …

AES software implementations on ARM7TDMI

M Darnall, D Kuhlman - International Conference on Cryptology in India, 2006 - Springer
Abstract Information security on small, embedded devices has become a necessity for high-
speed business. ARM processors are the most common for use in embedded devices. In this …

[PDF][PDF] Architectural evaluation of algorithms RSA, ECC and MQQ in arm processors

G da Silva Quirino, ED Moreno - International journal of Computer …, 2013 - academia.edu
Embedded devices are present in many of our daily activities. In some of these activities is
necessary to protect the data from possible attacks. Due to resource constraints, it is …

Boosting AES performance on a tiny processor core

S Tillich, C Herbst - Cryptographers' Track at the RSA Conference, 2008 - Springer
Notwithstanding the tremendous increase in performance of desktop computers, more and
more computational work is performed on small embedded microprocessors. Particularly …

[PDF][PDF] Secured encryption-concept and challenge

GS Tanwar, G Singh, V Gaur - International Journal of Computer …, 2010 - academia.edu
This paper contains a complications related to access systems and their functionality.
Several cryptographic algorithms were implemented using the public library Lib-Tom-Crypt …

[HTML][HTML] Performance evaluation of Raspberry Pi 4 and STM32 Nucleo boards for security-related operations in IoT environments

K Rzepka, P Szary, K Cabaj, W Mazurczyk - Computer Networks, 2024 - Elsevier
Abstract At present, Internet of Things devices are revolutionizing and impacting increasingly
more areas of our daily lives. However, there remain doubts related to the lack of sufficient …

[PDF][PDF] Performance evaluation of cryptographic operations on a SAMR21-XPRO board

M Tausig, S Schmidt - Proc. Conf.: RIOT-OS Summit, 2016 - researchgate.net
In order to define a reasonable format for firmware update packages, the performance and
the memory footprint of various cryptographic operations have been evaluated using RIOT …