Katalog der Deutschen Nationalbibliothek

Neuigkeiten

Leichte Bedienung, intuitive Suche: Die Betaversion unseres neuen Katalogs ist online! → Zur Betaversion des neuen DNB-Katalogs

 
 
 


Ergebnis der Suche nach: "security"
im Bestand: Gesamter Bestand

191 - 200 von 16303
<< < > >>


Artikel 191 Tailorable codes for lattice-based KEMs with applications to compact ML-KEM instantiations
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 3
Online Ressource
Artikel 192 The Large Block Cipher Vistrutah
Enthalten in IACR transactions on symmetric cryptology Bd. 2025, 2025, Nr. 3
Online Ressource
Artikel 193 TREE: Bridging the gap between reconfigurable computing and secure execution
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 3
Online Ressource
Artikel 194 A Code-Based ISE to Protect Boolean Masking in Software
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 2
Online Ressource
Artikel 195 AETHER: An Ultra-High Throughput and Low Energy Authenticated Encryption Scheme
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 2
Online Ressource
Artikel 196 Higher-Order Time Sharing Masking
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 2
Online Ressource
Artikel 197 Improving MPCitH with Preprocessing: Mask Is All You Need
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 2
Online Ressource
Artikel 198 Information Theoretic Analysis of PUF-Based Tamper Protection
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 2
Online Ressource
Artikel 199 Leaky McEliece: Secret Key Recovery From Highly Erroneous Side-Channel Information
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 2
Online Ressource
Artikel 200 MulLeak: Exploiting Multiply Instruction Leakage to Attack the Stack-optimized Kyber Implementation on Cortex-M4
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 2
Online Ressource


191 - 200 von 16303
<< < > >>


E-Mail-IconAdministration