Katalog der Deutschen Nationalbibliothek

Neuigkeiten Servicezeiten in Frankfurt am Main ab 1. Dezember 2025: Montag bis Freitag 9–18 Uhr und Samstag 10–16 Uhr
Service hours in Frankfurt am Main from 1 December 2025: Monday to Friday 9:00-18:00 and Saturday 10:00-16:00
 
Neuigkeiten Wegen Wartungsarbeiten ist vom 12. bis 14. Januar 2026 der Museumslesesaal, sowie vom 14. bis 16. Januar 2026 der Musiklesesaal geschlossen. // Due to maintenance work the museum reading room will be closed from 12 to 14 January 2026 and the music reading room from 14 to 16 January 2026.
 
 
 


Ergebnis der Suche nach: "security"
im Bestand: Gesamter Bestand

81 - 90 von 15773
<< < > >>


Artikel 81 Fault Injection Evaluation with Statistical Analysis
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 4
Online Ressource
Artikel 82 HADES: Automated Hardware Design Exploration for Cryptographic Primitives
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 4
Online Ressource
Artikel 83 Let us walk on the 3-isogeny graph: efficient, fast, and simple
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 4
Online Ressource
Artikel 84 mid-pSquare: Leveraging the Strong Side-Channel Security of Prime-Field Masking in Software
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 4
Online Ressource
Artikel 85 Multi-Value Plaintext-Checking and Full-Decryption Oracle-Based Attacks on HQC from Offline Templates
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 4
Online Ressource
Artikel 86 Quantum security analysis of Module-LWE PQC based on practical cost estimates
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 4
Online Ressource
Artikel 87 Rejected Signatures’ Challenges Pose New Challenges: Key Recovery of CRYSTALS-Dilithium via Side-Channel Attacks
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 4
Online Ressource
Artikel 88 TESLA: Trusted Execution Support for Legacy Embedded Applications
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 4
Online Ressource
Artikel 89 Attacking Split-and-Lookup-Based Primitives Using Probabilistic Polynomial System Solving
Enthalten in IACR transactions on symmetric cryptology Bd. 2025, 2025, Nr. 3
Online Ressource
Artikel 90 Code-based Masking: From Fields to Bits Bitsliced Higher-Order Masked SKINNY
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 3
Online Ressource


81 - 90 von 15773
<< < > >>


E-Mail-IconAdministration