|
141 |
Investing for what? A Bourdieusian class perspective on well-educated Chinese immigrants faced with linguistic and cultural barriers in Canada Enthalten in International journal of the sociology of language Bd. 2025, 2025, Nr. 295: 79-99. 21 S.
|
|
|
142 |
Loving from afar: Japanese language learners and their imagined target language communities in contemporary Hong Kong Enthalten in International journal of the sociology of language Bd. 2025, 2025, Nr. 293: 35-59. 25 S.
|
|
|
143 |
BASTION: A Framework for Secure Third-Party IP Integration in NoC-based SoC Platforms Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 4
|
|
|
144 |
Constant-Cycle Hardware Private Circuits Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 4
|
|
|
145 |
Entropy extractor based high-throughput post-processings for True Random Number Generators Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 4
|
|
|
146 |
Fast AVX-512 Implementation of the Optimal Ate Pairing on BLS12-381 Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 4
|
|
|
147 |
Fault Injection Evaluation with Statistical Analysis Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 4
|
|
|
148 |
HADES: Automated Hardware Design Exploration for Cryptographic Primitives Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 4
|
|
|
149 |
Let us walk on the 3-isogeny graph: efficient, fast, and simple Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 4
|
|
|
150 |
mid-pSquare: Leveraging the Strong Side-Channel Security of Prime-Field Masking in Software Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 4
|
|