News
The cybersecurity world is on the brink of a revolution, driven by quantum computing. Quantum computers can also break the ...
The National Institute of Standards and Technology’s National Cybersecurity Center of Excellence has unveiled its final practice guide for zero trust, Implementing a Zero Trust Architecture, or ...
In this paper we present an hardware implementation of the RSA algorithm for public-key cryptography. The RSA algorithm consists in the computation of modular exponentials on large integers, that can ...
This research focuses on the methods to improve the throughput and lower the power for low cost RSA coprocessors. We proposed the following optimized methods: 1. A fast half-carry-save Montgomery ...
This is an implementation of the Karatsuba polynomial multiplication algorithm in the LEGv8 assembly language, a RISC ISA part of the ARM architecture family. This was done as my final project for ECE ...
This project aims to predict smartphone prices using a combination of batch and stream processing techniques in a Big Data environment. The architecture follows the Lambda Architecture pattern, ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results