Linked e-resources

Details

Symmetric Cryptography
Computing the Distribution of Differentials over the Non-linear Mapping
Light-OCB: Parallel Lightweight Authenticated Cipher with Full Security
LP Based Differential Attack on Round Reduced WARP
Post-quantum cryptography and homomorphic encryption
SHELBRS: Location-Based Recommendation Services using Switchable Homomorphic Encryption
On Threat of Hardware Trojan To Post-Quantum Lattice-based Schemes: A Key Recovery Attack on SABER and beyond
Safe-Error Attacks on SIKE and CSIDH
Hardware security and side-channel attacks
Network Data Remanence Side Channel Attack on SPREAD, H-SPREAD and Reverse AODV
Parasite: Mitigating Physical Side-channel Attacks against Neural Networks
Reinforcement Learning-based Design of Side-channel Countermeasures
Deep Freezing Attacks on Capacitors and Electronic Circuits
AI and Cloud security
Encrypted SQL Arithmetic Functions Processing for Secure Cloud Database
Robustness Against Adversarial Attacks using Dimensionality
SoK - Network Intrusion Detection on FPGA.

Browse Subjects

Show more subjects...

Statistics

from
to
Export