National Repository of Grey Literature 253 records found  beginprevious112 - 121nextend  jump to record: Search took 0.13 seconds. 
Post Quantum Cryptography on FPGA
Gyõri, A. ; Smékal, D.
This work describes the post-quantum algorithm FrodoKEM, its hardware implementation in VHDL and software simulation of implementation. The issue of postquantum cryptography and the VHDL programming language used to describe the functionality of the hardware was studied. The acquired knowledge was transformed into a functional simulation of all parts of the algorithm. All these parts have already been implemented separately, so that the functionality of every single part can be separately approached. These parts are key generation, encapsulation and decapsulation. After successful simulation. These parts will be synthetised and implemented to FPGA board NEXYS A7.
WWW tutorial for HP 3D scanner Pro S3
MOJŽÍŠOVÁ, Denisa
In the first part, this work deals with the basic concepts and principles of operation of 3D scanning technology, there are analysed the various types of 3D scanners. The hardware and software of the HP 3D scanner Pro S3 are also discussed. In the second part, the hardware connection and setting of basic software parameters is analysed in detail, which is supplemented by sample tasks. In the end, the findings that were recorded during the work are summarized.
Software and Hardware Based Fault Injection Attacks against the CPU and MCU
Lörinc, Marek ; Hanáček, Petr (referee) ; Perešíni, Martin (advisor)
The thesis deals with attacks that cause faults in CPU and MCU calculations. A short voltage change in CPU or MCU is used to trigger the error. The theoretical part of the thesis deals with the description of how to cause and exploit these errors. This section also describes the most well-known protection against hardware attacks, which is a trusted execution environment (TEE). Inject a fault to TEE is the primary target of fault attacks. The practical part deals with the replication of PlunderVolt and VoltPillager attacks on Intel processors with an activated TEE SGX. Several experiments were performed to trigger faults in RSA and AES encryption within the SGX enclave. To obtain the encryption key from these errors, known analysis methods were used. The practical part also deals with the replication of the attack on ARM microcontrollers with an active TEE TrustZone-M.
Firmware for Testing Platform JaQT
Veverka, Jiří ; Drahanský, Martin (referee) ; Malaník, Petr (advisor)
This bachelor thesis is about the JaQT (Just a Quick Test) platform which was developed for simple and fast software-hardware testing. The theoretical part of this thesis is describing used MCU, control board, peripherals and interfaces. The USB protocol and its CDC ACM class which is used for interfacing the device to enable communication with the board is described in this part as well. In the practical part is described how the JaQT was implemented, debugged, tested, used and evaluated.
Postquantum cryptography on FPGA
Győri, Adam ; Jedlička, Petr (referee) ; Smékal, David (advisor)
This work describes the post-quantum algorithm FrodoKEM, its hardware implementation in VHDL and software simulation of implementation, subsequent implementation of the implementation on the FPGA process system. The work describes the issue of postquantum cryptography and VHDL programming language used to describe the functionality of hardware. Furthermore, the work deals with the functional implementation and simulation of all parts of the algorithm. Specifically, these are parts, key generation, encapsulation, and decapsulation. Algorithm implementation and simulations were performed in the Vivado software simulation environment, created by Xilinx. Subsequently, the synthesis and implementation was performed and the Intellectual property block was designed, the key part of which covered the functionality of the NEXYS A7 FPGA board was not available. The last part of the work deals with the workflow algorithm for implementation on FPGA board NEXYS A7.
Use of GPS in the Car Industry Oriented on Self-driving Vehicles
Gróf, Marko ; Sedláček, Pavel (referee) ; Šedrlová, Magdalena (advisor)
Tato bakalářská práce se zabývá využitím GPS v automobilovém průmyslu se zaměřením na bezpilotní vozidla. Hlavním cílem bylo přiblížit GPS systém jako takový, jeho využití v autonomních vozidlech, vysvětlit výhody i nevýhody těchto automobilů a popsat různé hardwary a softwary, které dále využívají. První polovina práce nejprve do velkých detailů charakterizuje GPS, aby se čtenář seznámil s tím, jak navigační systém pracuje. V druhé části se čtenář dozví o autonomních vozech, do jakých úrovní jsou rozdělena, a které systémy používají. Dále jsou zde popsány výhody a nevýhody těchto vozidel a také hlavní rozdíly mezi dnešními a autonomními auty. Závěr této práce je soustředěn na benefity inteligentní dopravy, ale i na pohled do budoucnosti vozidel či celé dopravy.
Computing Platforms For Deep Learning Task In Computer Vision
Kratochvila, Lukas
The recent progress in machine learning in computer vision guides to enormous hardware requirements. This paper discovers new innovative hardware capable of dealing with immense demands. The important decision is concentrating on task learning or the final classification. The main concern is on five domains: single-board computers, hardware accelerators, graphics cards, workstations, and cloud computing. These devices have several key features for detection that are discussed. Cloud computing is another presented approach. Furthermore, different delivery models of cloud computing are addressed.

National Repository of Grey Literature : 253 records found   beginprevious112 - 121nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.