Search Constraints
« Previous |
1 - 20 of 50
|
Next »
Search Results
Select an image to start the slideshow
Investigating the Practical Limits of Rowhammer Attacks
1 of 20
Chaos in Memory: A Comprehensive Analysis of Register and Stack Variable Corruption
2 of 20
Cross-Layer Vulnerability Analysis of System-on-Chip against Physical Hardware Attacks
3 of 20
Software-Induced Fault Attacks on Post-Quantum Signature Schemes
4 of 20
Side-channel Testing Infrastructures in Preand Post-Silicon Settings
5 of 20
Design and Evaluation of Bit-sliced Neural Network and Post-Quantum Implementations
6 of 20
Internal Cognitive Assurance Model for Autonomous Robotic Systems (ICAMARS)
7 of 20
Hardware Simulation of Embedded Software Fault Attacks: How to SimpliFI Processor Fault Vulnerability Evaluation
8 of 20
A Reinforcement Learning Approach To Optimize the MLC Prefetcher Aggressiveness at Run-Time
9 of 20
Revisiting Isolated and Trusted Execution via Microarchitectural Cryptanalysis
10 of 20
Towards Automated Analysis of Microarchitectural Attacks using Machine Learning
11 of 20
Micro-architectural Threats to Modern Computing Systems
12 of 20
Applications of Fully Homomorphic Encryption
13 of 20
Understanding and Countermeasures against IoT Physical Side Channel Leakage
14 of 20
Accelerating BGV Scheme of Fully Homomorphic Encryption Using GPUs
15 of 20
Improving the Efficiency of Homomorphic Encryption Schemes
16 of 20
Side Channel Leakage Exploitation, Mitigation and Detection of Emerging Cryptosystems
17 of 20
Threshold Implementations of the Present Cipher
18 of 20
New Approaches for Efficient Fully Homomorphic Encryption
19 of 20
Lightweight Cryptography Meets Threshold Implementation: A Case Study for SIMON
20 of 20