Katalog der Deutschen Nationalbibliothek

Neuigkeiten Servicezeiten in Frankfurt am Main ab 1. Dezember 2025: Montag bis Freitag 9–18 Uhr und Samstag 10–16 Uhr
Service hours in Frankfurt am Main from 1 December 2025: Monday to Friday 9:00-18:00 and Saturday 10:00-16:00
 
 
 


Ergebnis der Suche nach: "security"
im Bestand: Gesamter Bestand

81 - 90 von 15776
<< < > >>


Artikel 81 Fast AVX-512 Implementation of the Optimal Ate Pairing on BLS12-381
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 4
Online Ressource
Artikel 82 Fault Injection Evaluation with Statistical Analysis
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 4
Online Ressource
Artikel 83 HADES: Automated Hardware Design Exploration for Cryptographic Primitives
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 4
Online Ressource
Artikel 84 Let us walk on the 3-isogeny graph: efficient, fast, and simple
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 4
Online Ressource
Artikel 85 mid-pSquare: Leveraging the Strong Side-Channel Security of Prime-Field Masking in Software
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 4
Online Ressource
Artikel 86 Multi-Value Plaintext-Checking and Full-Decryption Oracle-Based Attacks on HQC from Offline Templates
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 4
Online Ressource
Artikel 87 Quantum security analysis of Module-LWE PQC based on practical cost estimates
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 4
Online Ressource
Artikel 88 Rejected Signatures’ Challenges Pose New Challenges: Key Recovery of CRYSTALS-Dilithium via Side-Channel Attacks
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 4
Online Ressource
Artikel 89 TESLA: Trusted Execution Support for Legacy Embedded Applications
Enthalten in IACR transactions on cryptographic hardware and embedded systems Bd. 2025, 2025, Nr. 4
Online Ressource
Artikel 90 Attacking Split-and-Lookup-Based Primitives Using Probabilistic Polynomial System Solving
Enthalten in IACR transactions on symmetric cryptology Bd. 2025, 2025, Nr. 3
Online Ressource


81 - 90 von 15776
<< < > >>


E-Mail-IconAdministration