Katalog der Deutschen Nationalbibliothek

Neuigkeiten Servicezeiten in Frankfurt am Main ab 1. Dezember 2025: Montag bis Freitag 9–18 Uhr und Samstag 10–16 Uhr
Service hours in Frankfurt am Main from 1 December 2025: Monday to Friday 9:00-18:00 and Saturday 10:00-16:00
 
Neuigkeiten

Leichte Bedienung, intuitive Suche: Die Betaversion unseres neuen Katalogs ist online! → Zur Betaversion des neuen DNB-Katalogs

 
 
 


Ergebnis der Suche nach: "security"
im Bestand: Gesamter Bestand

101 - 110 von 15690
<< < > >>


Artikel 101 Primitive-Level vs. Implementation-Level DPA Security: a Certified Case Study
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 3
Online Ressource
Artikel 102 Secure and efficient transciphering for FHE-based MPC
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 3
Online Ressource
Artikel 103 Tailorable codes for lattice-based KEMs with applications to compact ML-KEM instantiations
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 3
Online Ressource
Artikel 104 The Large Block Cipher Vistrutah
Enthalten in IACR transactions on symmetric cryptology Bd. 2025, 2025, Nr. 3
Online Ressource
Artikel 105 TREE: Bridging the gap between reconfigurable computing and secure execution
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 3
Online Ressource
Artikel 106 A Code-Based ISE to Protect Boolean Masking in Software
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 2
Online Ressource
Artikel 107 AETHER: An Ultra-High Throughput and Low Energy Authenticated Encryption Scheme
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 2
Online Ressource
Artikel 108 Higher-Order Time Sharing Masking
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 2
Online Ressource
Artikel 109 Improving MPCitH with Preprocessing: Mask Is All You Need
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 2
Online Ressource
Artikel 110 Information Theoretic Analysis of PUF-Based Tamper Protection
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 2
Online Ressource


101 - 110 von 15690
<< < > >>


E-Mail-IconAdministration