Katalog der Deutschen Nationalbibliothek

Neuigkeiten

Leichte Bedienung, intuitive Suche: Die Betaversion unseres neuen Katalogs ist online! → Zur Betaversion des neuen DNB-Katalogs

 
 
 


Ergebnis der Suche nach: "security"
im Bestand: Gesamter Bestand

181 - 190 von 16253
<< < > >>


Artikel 181 TREE: Bridging the gap between reconfigurable computing and secure execution
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 3
Online Ressource
Artikel 182 A Code-Based ISE to Protect Boolean Masking in Software
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 2
Online Ressource
Artikel 183 AETHER: An Ultra-High Throughput and Low Energy Authenticated Encryption Scheme
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 2
Online Ressource
Artikel 184 Higher-Order Time Sharing Masking
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 2
Online Ressource
Artikel 185 Improving MPCitH with Preprocessing: Mask Is All You Need
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 2
Online Ressource
Artikel 186 Information Theoretic Analysis of PUF-Based Tamper Protection
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 2
Online Ressource
Artikel 187 Leaky McEliece: Secret Key Recovery From Highly Erroneous Side-Channel Information
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 2
Online Ressource
Artikel 188 MulLeak: Exploiting Multiply Instruction Leakage to Attack the Stack-optimized Kyber Implementation on Cortex-M4
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 2
Online Ressource
Artikel 189 Multiple Rows Mixers and Hsilu
Enthalten in IACR transactions on symmetric cryptology Bd. 2025, 2025, Nr. 2
Online Ressource
Artikel 190 New Quantum Cryptanalysis of Binary Elliptic Curves
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 2
Online Ressource


181 - 190 von 16253
<< < > >>


E-Mail-IconAdministration