5 results on '"Picek, Stjepan"'
Search Results
2. On the feasibility of using evolvable hardware for hardware Trojan detection and prevention
3. Cryptographic Boolean functions: One output, many design criteria
4. Backdoor Pony: Evaluating backdoor attacks and defenses in different domains
5. Immunological algorithms paradigm for construction of Boolean functions with good cryptographic properties.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.