Katalog der Deutschen Nationalbibliothek

Neuigkeiten Servicezeiten in Frankfurt am Main ab 1. Dezember 2025: Montag bis Freitag 9–18 Uhr und Samstag 10–16 Uhr
Service hours in Frankfurt am Main from 1 December 2025: Monday to Friday 9:00-18:00 and Saturday 10:00-16:00
 
Neuigkeiten

Leichte Bedienung, intuitive Suche: Die Betaversion unseres neuen Katalogs ist online! → Zur Betaversion des neuen DNB-Katalogs

 
 
 


Ergebnis der Suche nach: "security"
im Bestand: Gesamter Bestand

111 - 120 von 15690
<< < > >>


Artikel 111 Leaky McEliece: Secret Key Recovery From Highly Erroneous Side-Channel Information
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 2
Online Ressource
Artikel 112 MulLeak: Exploiting Multiply Instruction Leakage to Attack the Stack-optimized Kyber Implementation on Cortex-M4
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 2
Online Ressource
Artikel 113 Multiple Rows Mixers and Hsilu
Enthalten in IACR transactions on symmetric cryptology Bd. 2025, 2025, Nr. 2
Online Ressource
Artikel 114 New Quantum Cryptanalysis of Binary Elliptic Curves
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 2
Online Ressource
Artikel 115 On the Security of Split-and-Lookup-Based ZK-Friendly Primitives
Enthalten in IACR transactions on symmetric cryptology Bd. 2025, 2025, Nr. 2
Online Ressource
Artikel 116 Poseidon and Neptune: Gröbner Basis Cryptanalysis Exploiting Subspace Trails
Enthalten in IACR transactions on symmetric cryptology Bd. 2025, 2025, Nr. 2
Online Ressource
Artikel 117 Rudraksh: A compact and lightweight post-quantum key-encapsulation mechanism
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 2
Online Ressource
Artikel 118 SeaFlame: Communication-Efficient Secure Aggregation for Federated Learning against Malicious Entities
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 2
Online Ressource
Artikel 119 Zeroed Out: Cryptanalysis of Weak PRFs in Alternating Moduli
Enthalten in IACR transactions on symmetric cryptology Bd. 2025, 2025, Nr. 2
Online Ressource
Artikel 120 A More Practical Attack Against Yoroi
Enthalten in IACR transactions on symmetric cryptology Bd. 2025, 2025, Nr. 1
Online Ressource


111 - 120 von 15690
<< < > >>


E-Mail-IconAdministration