Katalog der Deutschen Nationalbibliothek

Neuigkeiten Servicezeiten in Frankfurt am Main ab 1. Dezember 2025: Montag bis Freitag 9–18 Uhr und Samstag 10–16 Uhr
Service hours in Frankfurt am Main from 1 December 2025: Monday to Friday 9:00-18:00 and Saturday 10:00-16:00
 
Neuigkeiten

Leichte Bedienung, intuitive Suche: Die Betaversion unseres neuen Katalogs ist online! → Zur Betaversion des neuen DNB-Katalogs

 
Neuigkeiten 24. Dezember 2025 bis 1. Januar 2026: Die Deutsche Nationalbibliothek bleibt an beiden Standorten geschlossen. Bestellte Medien werden am 2. Januar 2026 bereitgestellt. // 24 December 2025 to 1 January 2026: The German National Library will be closed at both locations. Ordered media will be made available on 2 January 2026.
 
 
 


Ergebnis der Suche nach: "security"
im Bestand: Gesamter Bestand

81 - 90 von 15690
<< < > >>


Artikel 81 Let us walk on the 3-isogeny graph: efficient, fast, and simple
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 4
Online Ressource
Artikel 82 mid-pSquare: Leveraging the Strong Side-Channel Security of Prime-Field Masking in Software
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 4
Online Ressource
Artikel 83 Multi-Value Plaintext-Checking and Full-Decryption Oracle-Based Attacks on HQC from Offline Templates
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 4
Online Ressource
Artikel 84 Quantum security analysis of Module-LWE PQC based on practical cost estimates
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 4
Online Ressource
Artikel 85 Rejected Signatures’ Challenges Pose New Challenges: Key Recovery of CRYSTALS-Dilithium via Side-Channel Attacks
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 4
Online Ressource
Artikel 86 TESLA: Trusted Execution Support for Legacy Embedded Applications
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 4
Online Ressource
Artikel 87 Attacking Split-and-Lookup-Based Primitives Using Probabilistic Polynomial System Solving
Enthalten in IACR transactions on symmetric cryptology Bd. 2025, 2025, Nr. 3
Online Ressource
Artikel 88 Code-based Masking: From Fields to Bits Bitsliced Higher-Order Masked SKINNY
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 3
Online Ressource
Artikel 89 Cymric: Short-tailed but Mighty
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 3
Online Ressource
Artikel 90 Design and Implementation of a Physically Secure Open-Source FPGA and Toolchain
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 3
Online Ressource


81 - 90 von 15690
<< < > >>


E-Mail-IconAdministration