Linked e-resources

Details

On the (in)Security of ChaCha20 Against Physical Attacks
An Industrial Outlook on Challenges of Hardware Security in Digital Economy
How to Digitally Construct and Validate TRNG and PUF Primitives Which Are Based on Physical Phenomenon
Cache Attacks: From Cloud to Mobile
May the Fourth Be with You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519
The Crisis of Standardizing DRM: The Case of W3C Encrypted Media Extensions
Parameter Choices for LWE
Efficient Side Channel Testing of Cryptographic Devices Using TVLA
IoT Insecurity
Innovation and Incentives in Industry
Hardware enabled cryptography: Physically Unclonable Functions and Random Numbers as Roots of Trust
Tackling the Time-Defence: An Instruction Count Based Microarchitectural Side-channel Attack on Block Ciphers
Hey Doc, Is This Normal?: Exploring Android Permissions in the Post Marshmallow Era
Efficient Software Implementation of Laddering Algorithms over Binary Elliptic Curves
Analysis of Diagonal Constants in Salsa
Practical Fault Attacks on Minalpher: How to Recover Key with Minimum Faults
eSPF: A Family of Format-Preserving Encryption Algorithms Using MDS Matrices
Similarity Based Interactive Private Information Retrieval
A Secure and Efficient Implementation of the Quotient Digital Signature Algorithm (qDSA)
Variable-Length Bit Mapping and Error Correcting Codes for Higher-Order Alphabet PUFs
Mutual Friend Attack Prevention in Social Network Data Publishing
Short Integrated PKE+PEKS in Standard Model
Differential Fault Attack on Grain v1, ACORN v3 and Lizard
Certain observations on ACORN v3 and the Implications to TMDTO Attacks
Efficient Implementation of Private License Plate Matching Protocols. .

Browse Subjects

Show more subjects...

Statistics

from
to
Export