Linked e-resources

Details

Symmetric Cryptography
Modeling Large S-box in MILP and a (Related-key) Differential Attack on Full Round PIPO-64/128
Light but Tight: Lightweight Composition of Serialized S-Boxes with Diffusion Layers for Strong Ciphers
Hardware Implementation of Masked SKINNY SBox with Application to AEAD
Bias Cancellation of MixColumns
Big Brother Is Watching You: A Closer Look At Backdoor Construction
Public-key Cryptography, Post-quantum Cryptography, Zero Knowledge Proofs
KEMTLS vs. Post-Quantum TLS: Performance on Embedded Systems
Protecting the most significant bits in scalar multiplication algorithms
Combining Montgomery Multiplication with Tag Tracing for the Pollard ' s Rho Algorithm in Prime Order Fields
Card-based zero-knowledge proof for the nearest neighbor property: Zero-knowledge proof of ABC end view
Hardware Security and AI
What Do You See? Transforming Fault Injection Target Characterizations
Dual-Tone Multi-Frequency Assisted Acoustic Side Channel Attack to Retrieve Dialled Call Log
Machine Learning Attacks on Low-Cost Reconfigurable XRRO and XRBR PUF Designs
HWGN2: Side-channel Protected NNs through Secure and Private Function Evaluation
How Many Cameras Do You Need? Adversarial Attacks and Countermeasures for Robust Perception in Autonomous Vehicles
Network security, Authentication, and Privacy
SMarT: A SMT based Privacy Preserving Smart Meter Streaming Methodology
An analysis of the hardware-friendliness of AMQ data structures for network security
RemOD: Operational Drift-adaptive Intrusion Detection
A short note on a paper titled A Delaunay Quadrangle-Based Fingerprint Authentication System with Template Protection using Topology Code for local registration and security enhancement.

Browse Subjects

Show more subjects...

Statistics

from
to
Export