Search Constraints
Search Results
Select an image to start the slideshow
Investigating the Practical Limits of Rowhammer Attacks
1 of 20
Chaos in Memory: A Comprehensive Analysis of Register and Stack Variable Corruption
2 of 20
Side-channel Testing Infrastructures in Preand Post-Silicon Settings
3 of 20
Design and Evaluation of Bit-sliced Neural Network and Post-Quantum Implementations
4 of 20
Hardware Simulation of Embedded Software Fault Attacks: How to SimpliFI Processor Fault Vulnerability Evaluation
5 of 20
A Reinforcement Learning Approach To Optimize the MLC Prefetcher Aggressiveness at Run-Time
6 of 20
Accelerating BGV Scheme of Fully Homomorphic Encryption Using GPUs
7 of 20
Threshold Implementations of the Present Cipher
8 of 20
Lightweight Cryptography Meets Threshold Implementation: A Case Study for SIMON
9 of 20
µLeech: A Side-Channel Evaluation Platform for Next Generation Trusted Embedded Systems
10 of 20
Design and Implementation of
11 of 20
An Efficient Scheme to Provide Real-time Memory Integrity Protection
12 of 20
Rijndael Circuit Level Cryptanalysis
13 of 20
Low Power Elliptic Curve Cryptography
14 of 20
Universal Hashing for Ultra-Low-Power Cryptographic Hardware Applications
15 of 20
Efficient Algorithms for Finite Fields, with Applications in Elliptic Curve Cryptography
16 of 20
Versatile Montgomery Multiplier Architectures
17 of 20
Efficient NTRU Implementations
18 of 20
Efficient Algorithms for Elliptic Curve Cryptosystems on Embedded Systems
19 of 20
Computer Architectures for Cryptosystems Based on Hyperelliptic Curves
20 of 20