-
1Academic Journal
المؤلفون: Makoto NAGATA
المصدر: IEICE Transactions on Electronics. 2023, E106.C(7):345
-
2
المؤلفون: Fritzmann, Tim
المساهمون: Sigl, Georg (Prof. Dr.), Müller-Gritschneder, Daniel (Prof. Dr.)
مصطلحات موضوعية: Ingenieurwissenschaften, Post-quantum cryptography, lattice-based cryptography, embedded devices, hardware accelerators, implementation attacks, ddc:620, Post-Quanten-Kryptografie, gitterbasierte Kryptografie, eingebettete Geräte, Hardwarebeschleuniger, Implementierungsattacken
وصف الملف: application/pdf
-
3Dissertation/ Thesis
المؤلفون: Fritzmann, Tim
المساهمون: Sigl, Georg (Prof. Dr.), Müller-Gritschneder, Daniel (Prof. Dr.)
مصطلحات موضوعية: info:eu-repo/classification/ddc/620, Ingenieurwissenschaften, Post-quantum cryptography, lattice-based cryptography, embedded devices, hardware accelerators, implementation attacks, Post-Quanten-Kryptografie, gitterbasierte Kryptografie, eingebettete Geräte, Hardwarebeschleuniger, Implementierungsattacken
وصف الملف: application/pdf
Relation: https://mediatum.ub.tum.de/1650057; https://mediatum.ub.tum.de/doc/1650057/document.pdf; http://nbn-resolving.de/urn:nbn:de:bvb:91-diss-20221222-1650057-1-3
-
4Conference
المؤلفون: Fornaciari, William
المساهمون: Fornaciari, William
مصطلحات موضوعية: implementation attacks, global power manager, resource orchestrator, unbalanced resource exploitation, on-line power monitor, hardware description, ScaDL 2022, power monitors, ML techniques, Euro-HPC TEXTAROSSA project, high performance computing, heterogeneous computing platforms, HPC applications, secure context, power management, high-level-synthesis, run-time information, power consumption, ad-hoc designed accelerators
وصف الملف: STAMPA
Relation: info:eu-repo/semantics/altIdentifier/isbn/978-1-6654-9747-3; ispartofbook:Proceedings of 2022 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW); IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW); firstpage:1039; lastpage:1039; numberofpages:1; http://hdl.handle.net/11311/1219911; https://ieeexplore.ieee.org/abstract/document/9835282
-
5Academic Journal
المؤلفون: Michael Hutter, Thomas Plos
المساهمون: The Pennsylvania State University CiteSeerX Archives
مصطلحات موضوعية: RFID, Fault Analysis, Antenna Tearing, Optical Injections, Electromagnetic Analysis, Implementation Attacks
وصف الملف: application/pdf
-
6
المؤلفون: Marc Joye, Matthieu Rivain, Raveen R. Goundar, Alexandre Venelli, Atsuko Miyaji
المصدر: Journal of Cryptographic Engineering. 1:161-176
مصطلحات موضوعية: Jacobian coordinates, Computer Networks and Communications, business.industry, Meloni’s technique, Cryptography, Type (model theory), implementation attacks, Scalar multiplication, Algebra, Elliptic curve point multiplication, Elliptic curve, regular ladders, Counting points on elliptic curves, Elliptic curves, Point (geometry), Hardware_ARITHMETICANDLOGICSTRUCTURES, Variety (universal algebra), Arithmetic, business, Software, Mathematics
وصف الملف: application/pdf
-
7
المؤلفون: Goundar, Raveen Ravinesh, Joye, Marc, Miyaji, Atsuko
المصدر: Lecture Notes in Computer Science. :65-79
مصطلحات موضوعية: regular binary ladders, Jacobian coordinates, Meloni’s technique, Hardware_ARITHMETICANDLOGICSTRUCTURES, implementation attacks, Elliptic Curves
وصف الملف: application/pdf
-
8Book
المؤلفون: Kasper, Timo, Oswald, David, Paar, Christof, Juels, Ari
المصدر: RFID security and privacy : 7th international workshop ; revised selected papers / RFIDSec 2011, Amherst, MA, USA, June 26 - 28, 2011.
مصطلحات موضوعية: ddc:004, ddc:000, contactless smartcards, DESFire MF3ICD40, hardware security, implementation attacks, side-channel analyis
وصف الملف: 61–77
Relation: urn:isbn:978-3-642-25285-3; Lecture Notes in Computer Science
-
9
المؤلفون: Picek, S.
المساهمون: Jakobović, Domagoj, Jacobs, B.P.F., Jakobovic, D., Marchiori, E., Radboud University Nijmegen
المصدر: IPA dissertation series ; XXXI. s.n. : S.I.
IPA dissertation series ; XXXIمصطلحات موضوعية: kriptologija, cryptography, analiza, Elektrotehnika, implementacijski napadi, TECHNICAL SCIENCES. Computing. Architecture of Computer Systems, IPA dissertation series, udc:621.3(043.3), TEHNIČKE ZNANOSTI. Računarstvo. Arhitektura računalnih sustava, Electrical engineering, Evolutionary computation, cryptology, implementation attacks, analysis, evolucijsko računarstvo, primjene, ComputingMethodologies_GENERAL, Digital Security, evolucijski algoritmi, kriptografija, GeneralLiterature_REFERENCE(e.g.,dictionaries,encyclopedias,glossaries)
وصف الملف: application/pdf
-
10Conference
المؤلفون: Ciet, M., Joye, M., 5th International Conference on Information and Communications Security
المساهمون: UCL - Autre
المصدر: Lecture Notes in Computer Science, Vol. 2836, p. 348-359 (2003)
مصطلحات موضوعية: Randomization, Elliptic Curve Cryptography, Implementation Attacks, Side-channel Analysis, Elliptic Curve Models, Point Multiplication Algorithms
Relation: boreal:61381; http://hdl.handle.net/2078.1/61381; urn:ISSN:0302-9743; urn:EISSN:1611-3349
-
11
المؤلفون: Oliver Jung, Ivan Gojmerac, Andreas Berger
مصطلحات موضوعية: Standardization, Computer Networks and Communications, business.industry, Computer science, Quality of service, Botnet, IP Multimedia Subsystem, Denial-of-service attack, IMS, DoS, SPIT/SPAM, IDS, Implementation attacks, SIP, Botnets, NGN, QoS, Penetration testing, Web 2.0, Internet security, Computer security, computer.software_genre, Next-generation network, The Internet, business, computer, Information Systems, Computer network
-
12Academic Journal
المؤلفون: Raveen R. Goundar, Marc Joye, Atsuko Miyaji
المساهمون: The Pennsylvania State University CiteSeerX Archives
المصدر: https://eprint.iacr.org/2010/309.pdf.
مصطلحات موضوعية: Key words, Elliptic curves, Meloni’s technique, Jacobian coordinates, regular binary ladders, implementation attacks, embedded
وصف الملف: application/pdf
-
13Academic Journal
المؤلفون: Benedikt Gierlichs, Jörn-marc Schmidt, Michael Tunstall
المساهمون: The Pennsylvania State University CiteSeerX Archives
المصدر: http://eprint.iacr.org/2012/678.pdf.
مصطلحات موضوعية: Implementation Attacks, Dummy Rounds, Infective Computation
وصف الملف: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.304.4249; http://eprint.iacr.org/2012/678.pdf
-
14Academic Journal
المؤلفون: L. Batina, S. Kumar, J. Lano, K. Lemke, N. Mentens, C. Paar, B. Preneel, K. Sakiyama, I. Verbauwhede
المساهمون: The Pennsylvania State University CiteSeerX Archives
مصطلحات موضوعية: stream ciphers, hardware implementations, implementation attacks
وصف الملف: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.104.833; http://www.ecrypt.eu.org/stream/papersdir/2006/014.pdf
-
15Academic Journal
المؤلفون: Timo Kasper, David Oswald, Christof Paar
المساهمون: The Pennsylvania State University CiteSeerX Archives
مصطلحات موضوعية: contactless smartcards, side-channel analyis, implementation attacks, hardware security, DESFire MF3ICD40
وصف الملف: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.431.9916; http://www.emsec.rub.de/media/crypto/veroeffentlichungen/2011/10/10/sca_demod_2011.pdf
-
16Academic Journal
المؤلفون: Jörn-marc Schmidt, Michael Tunstall, Roberto Avanzi, Ilya Kizhvatov, Timo Kasper, David Oswald
المساهمون: The Pennsylvania State University CiteSeerX Archives
مصطلحات موضوعية: Combined Implementation Attacks, Countermeasures, Infective Computation, RSA, ECC
وصف الملف: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.187.6012; http://www.crypto.rub.de/imperia/md/content/texte/publications/conferences/combined_implementation.pdf
-
17
مصطلحات موضوعية: Elliptic curves, Meloni’s technique, Jacobian coordinates, regular ladders, implementation attacks
وصف الملف: application/pdf
Relation: http://hdl.handle.net/10119/10293
الاتاحة: http://hdl.handle.net/10119/10293
-
18
المؤلفون: Goundar, Raveen Ravinesh, Joye, Marc, Miyaji, Atsuko
مصطلحات موضوعية: Elliptic Curves, Meloni’s technique, Jacobian coordinates, regular binary ladders, implementation attacks
وصف الملف: application/pdf
Relation: http://hdl.handle.net/10119/9597
الاتاحة: http://hdl.handle.net/10119/9597
-
19Electronic Resource
Additional Titles: Sichere Koprozessoren und Befehlssatzerweiterungen zur Beschleunigung von Post-Quanten-Kryptografie
المؤلفون: Sigl, Georg (Prof. Dr.), Sigl, Georg (Prof. Dr.);Müller-Gritschneder, Daniel (Prof. Dr.), Fritzmann, Tim
مصطلحات الفهرس: info:eu-repo/classification/ddc/620, Ingenieurwissenschaften, Post-quantum cryptography, lattice-based cryptography, embedded devices, hardware accelerators, implementation attacks, Post-Quanten-Kryptografie, gitterbasierte Kryptografie, eingebettete Geräte, Hardwarebeschleuniger, Implementierungsattacken, thesis, doc-type:doctoralThesis
-
20Electronic Resource
مصطلحات الفهرس: Elliptic curves, Meloni’s technique, Jacobian coordinates, regular ladders, implementation attacks, Journal Article, AM