Linked e-resources

Details

Deployment of EMC-Compliant IC Chip Techniques in Design for Hardware Security
Real Processing-in-Memory with Memristive Memory Processing Unit
Length Preserving Symmetric Encryption: Is it Important?
Towards Automatic Application of Side Channel Countermeasures
Challenges in Deep Learning-based Profiled Side-channel Analysis
A Study of Persistent Fault Analysis
Internal state recovery attack on Stream Ciphers : Breaking BIVIUM
Related-key Differential Cryptanalysis of Full Round CRAFT
SpookChain: Chaining a Sponge-Based AEAD with Beyond-Birthday Security
One trace is all it takes: Machine Learning-based Side-channel Attack on EdDSA
An Efficient Practical Implementation of Impossible-Differentia Cryptanalysis for Five-Round AES-128
Automated Classification of Web-Application Attacks for Intrusion Detection
Formal Analysis of PUF Instances Leveraging Correlation-Spectra in Boolean Functions
ProTro: A Probabilistic Counter based Hardware Trojan Attack on FPGA based MACSec enabled Ethernet Switch
Encrypted Classification Using Secure K-Nearest Neighbour Computation
A Few Negative Results on Constructions of MDS Matrices Using Low XOR Matrices
Revisiting the Security of LPN based RFID Authentication Protocol and Potential Exploits in Hardware Implementations.

Browse Subjects

Show more subjects...

Statistics

from
to
Export