Katalog der Deutschen Nationalbibliothek

Neuigkeiten

Leichte Bedienung, intuitive Suche: Die Betaversion unseres neuen Katalogs ist online! → Zur Betaversion des neuen DNB-Katalogs

 
 
 


Ergebnis der Suche nach: "security"
im Bestand: Gesamter Bestand

421 - 430 von 69785
<< < > >>


Artikel 421 Don’t be mean: Reducing Approximation Noise in TFHE through Mean Compensation
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2026, 2026, Nr. 1
Online Ressource
Artikel 422 FAST: Fast and Accurate Security Testing of HRP UWB Chips
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2026, 2026, Nr. 1
Online Ressource
Artikel 423 Fault Attacks on VOLEitH Signature Schemes
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2026, 2026, Nr. 1
Online Ressource
Artikel 424 High Fidelity Security Mesh Monitoring using Low-Cost, Embedded Time Domain Reflectometry
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2026, 2026, Nr. 1
Online Ressource
Artikel 425 Keep it Simple: Refreshing the NTT of Kyber’s Decapsulation to Prevent Plaintext-Checking Side-Channel Attacks
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2026, 2026, Nr. 1
Online Ressource
Artikel 426 ML-DSA masking sweetened with SUCRE: Shuffle-and-Unmask Countermeasure for REjection sampling
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2026, 2026, Nr. 1
Online Ressource
Artikel 427 NeonCROSS: Vectorized Implementation of Post-Quantum Signature CROSS on Cortex-A72 and Apple M3
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2026, 2026, Nr. 1
Online Ressource
Artikel 428 PWNN: Power-Wasting Neural Network As Remote Fault Injector
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2026, 2026, Nr. 1
Online Ressource
Artikel 429 Scalable Information Theoretic Evaluation of the Rank Statistics in Side-Channel Attacks
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2026, 2026, Nr. 1
Online Ressource
Artikel 430 Testing Security Equivalence in the Random Probing Model
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2026, 2026, Nr. 1
Online Ressource


421 - 430 von 69785
<< < > >>


E-Mail-IconAdministration