| E1.1 | Document of the initial design of the processor and the interfaces between the different components (memory hierarchy, core and accelerators) | Download | 
| E1.2 | Processor design final document | Download | 
| E2.1 | Analysis of post-quantum cryptographic schemes | Internal document | 
| E2.2 | Analysis of post-quantum cryptographic schemes. RISC-V extensions for virtualization and acceleration of post-quantum schemas | Internal document | 
| E2.3 | Analysis of side channel attacks | Internal document | 
| E2.4 | AAnalysis of post-quantum cryptographic schemes (second version). RISC-V extensions for schema virtualization and acceleration | Internal document | 
| E3.1 | Report on the performance of applications and analysis pipelines in computer systems | Download | 
| E3.2 | Development of an architecture simulator | Download | 
| E3.3 | Report on the performance of the final design and adaptation of pipelines to new architectures | Download | 
| E4.1 | Automotive Software Requirements | Download | 
| E4.2 | Specification, design and implementation of the automotive accelerator | Internal document | 
| E4.3 | Final implementation and evaluation of the final design of the automotive accelerator | Internal document | 
| E5.1 | Report on target technology | Download | 
| E5.2 | Reviewable run forecast calendar | Internal document | 
| E5.3 | Final report of participation in each run | Download | 
| E5.4 | Report on the development of the test platform and the characterization of the processor chips | Download | 
| E6.1 | Dissemination plan | Download | 
| E6.2 | Explotation plan | Internal document | 
| E6.3 | First dissemination and exploitation monitoring report | Download | 
| E6.4 | Second dissemination and exploitation monitoring report | Download | 
| E6.5 | Third dissemination and exploitation monitoring report | Download |