Katalog der Deutschen Nationalbibliothek

Neuigkeiten Servicezeiten in Frankfurt am Main ab 1. Dezember 2025: Montag bis Freitag 9–18 Uhr und Samstag 10–16 Uhr
Service hours in Frankfurt am Main from 1 December 2025: Monday to Friday 9:00-18:00 and Saturday 10:00-16:00
 
Neuigkeiten

Leichte Bedienung, intuitive Suche: Die Betaversion unseres neuen Katalogs ist online! → Zur Betaversion des neuen DNB-Katalogs

 
 
 


Ergebnis der Suche nach: "security"
im Bestand: Gesamter Bestand

91 - 100 von 15701
<< < > >>


Artikel 91 HCTR+: An Optimally Secure TBC-Based Accordion Mode
Enthalten in IACR transactions on symmetric cryptology Bd. 2025, 2025, Nr. 3
Online Ressource
Artikel 92 HIPR: Hardware IP Protection through Low-Overhead Fine-Grain Redaction
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 3
Online Ressource
Artikel 93 KeyVisor – A Lightweight ISA Extension for Protected Key Handles with CPU-enforced Usage Policies
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 3
Online Ressource
Artikel 94 LEAP: High-Performance Lattice-Based Pseudorandom Number Generator
Enthalten in IACR transactions on symmetric cryptology Bd. 2025, 2025, Nr. 3
Online Ressource
Artikel 95 Minimized PRFs from Public Permutations
Enthalten in IACR transactions on symmetric cryptology Bd. 2025, 2025, Nr. 3
Online Ressource
Artikel 96 Multidimensional Linear Cryptanalysis of AEGIS
Enthalten in IACR transactions on symmetric cryptology Bd. 2025, 2025, Nr. 3
Online Ressource
Artikel 97 On the Average Random Probing Model
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 3
Online Ressource
Artikel 98 On the Characterization of Phase Noise for the Robust and Resilient PLL-TRNG Design
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 3
Online Ressource
Artikel 99 POTA: A Pipelined Oblivious Transfer Acceleration Architecture for Secure Multi-Party Computation
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 3
Online Ressource
Artikel 100 Practical Opcode-based Fault Attack on AES-NI
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 3
Online Ressource


91 - 100 von 15701
<< < > >>


E-Mail-IconAdministration