Search

Your search keyword '"DATA encryption"' showing total 2,079 results

Search Constraints

Start Over You searched for: Descriptor "DATA encryption" Remove constraint Descriptor: "DATA encryption" Topic operating systems Remove constraint Topic: operating systems Publisher springer nature Remove constraint Publisher: springer nature
2,079 results on '"DATA encryption"'

Search Results

1. FPGA Design of Self-certified Signature Verification on Koblitz Curves.

2. PRESENT: An Ultra-Lightweight Block Cipher.

3. On the Implementation of a Fast Prime Generation Algorithm.

4. RFID Noisy Reader How to Prevent from Eavesdropping on the Communication?

5. Information Theoretic Evaluation of Side-Channel Resistant Logic Styles.

6. Differential Behavioral Analysis.

7. A Hardware-Assisted Realtime Attack on A5/2 Without Precomputations.

8. Collision Search for Elliptic Curve Discrete Logarithm over GF(2m) with FPGA.

9. CAIRN 2: An FPGA Implementation of the Sieving Step in the Number Field Sieve Method.

10. RF-DNA: Radio-Frequency Certificates of Authenticity.

11. Power and EM Attacks on Passive $13.56\,\textrm{MHz}$ RFID Devices.

12. Power Analysis Resistant AES Implementation with Instruction Set Extensions.

13. DPA-Resistance Without Routing Constraints?

14. TEC-Tree: A Low-Cost, Parallelizable Tree for Efficient Defense Against Memory Replay Attacks.

15. How to Maximize the Potential of FPGA Resources for Modular Exponentiation.

16. Arithmetic Operators for Pairing-Based Cryptography.

17. Multi-gigabit GCM-AES Architecture Optimized for FPGAs.

18. Secret External Encodings Do Not Prevent Transient Fault Analysis.

19. MAME: A Compression Function with Reduced Hardware Requirements.

20. AES Encryption Implementation and Analysis on Commodity Graphics Processing Units.

21. Highly Regular Right-to-Left Algorithms for Scalar Multiplication.

22. Collision Attacks on AES-Based MAC: Alpha-MAC.

23. Two New Techniques of Side-Channel Cryptanalysis.

24. On the Power of Bitslice Implementation on Intel Core2 Processor.

25. Side Channel Cryptanalysis of a Higher Order Masking Scheme.

26. Evaluation of the Masked Logic Style MDPL on a Prototype Chip.

27. High-Speed True Random Number Generation with Logic Gates Only.

28. FPGA Intrinsic PUFs and Their Use for IP Protection.

29. Masking and Dual-Rail Logic Don't Add Up.

30. A First-Order DPA Attack Against AES in Counter Mode with Unknown Initial Counter.

31. Gaussian Mixture Models for Higher-Order Side Channel Analysis.

32. SilentKnock: Practical, Provably Undetectable Authentication.

33. Cloak: A Ten-Fold Way for Reliable Covert Communications.

34. Adaptive Soundness of Static Equivalence.

35. Traceability and Integrity of Execution in Distributed Workflow Management Systems.

36. Dynamic Information Flow Control Architecture for Web Applications.

37. On the Automated Correction of Security Protocols Susceptible to a Replay Attack.

38. Modular Access Control Via Strategic Rewriting.

39. Renewable Traitor Tracing: A Trace-Revoke-Trace System For Anonymous Attack.

40. Countering Statistical Disclosure with Receiver-Bound Cover Traffic.

41. A Policy Language for Distributed Usage Control.

42. Incorporating Temporal Capabilities in Existing Key Management Schemes.

43. Extending the Common Services of eduGAIN with a Credential Conversion Service.

44. Towards Modeling Trust Based Decisions: A Game Theoretic Approach.

45. Insider Attacks Enabling Data Broadcasting on Crypto-Enforced Unicast Links.

46. Analyzing Side Channel Leakage of Masked Implementations with Stochastic Methods.

47. Security Evaluation of Scenarios Based on the TCG's TPM Specification.

48. Synthesizing Secure Protocols.

49. A Cryptographic Model for Branching Time Security Properties - The Case of Contract Signing Protocols.

50. On the Privacy of Concealed Data Aggregation.

Catalog

Books, media, physical & digital resources