Search Constraints
« Previous |
1 - 10 of 30
|
Next »
Search Results
Select an image to start the slideshow
High-Performance Decoder Architectures For Low-Density Parity-Check Codes
1 of 10
Software-Induced Fault Attacks on Post-Quantum Signature Schemes
2 of 10
Cross-Layer Vulnerability Analysis of System-on-Chip against Physical Hardware Attacks
3 of 10
Side Channel Leakage Analysis – Detection, Exploitation and Quantification
4 of 10
Cryptography for Ultra-Low Power Devices
5 of 10
Efficient and Tamper-Resilient Architectures for Pairing Based Cryptography
6 of 10
Data Sharing on Untrusted Storage with Attribute-Based Encryption
7 of 10
Efficient Side-Channel Aware Elliptic Curve Cryptosystems over Prime Fields
8 of 10
Modeling the Behavior of Multipath Components Pertinent to Indoor Geolocation
9 of 10
Jitter in Oscillators with 1/f Noise Sources and Application to True RNG for Cryptography
10 of 10