Search

Your search keyword '"nist"' showing total 6,074 results

Search Constraints

Start Over You searched for: Descriptor "nist" Remove constraint Descriptor: "nist" Topic business.industry Remove constraint Topic: business.industry
6,074 results on '"nist"'

Search Results

1. AxRLWE: A Multilevel Approximate Ring-LWE Co-Processor for Lightweight IoT Applications

2. A framework for validating open-source pulse sequences

3. Accurate Dosimetry for Radiobiology

4. Interlaboratory Comparison of Solar Cell Measurements Under Low Indoor Lighting Conditions

5. Cryptanalysis of the AEAD and hash algorithm DryGASCON

6. Randomly Distorted Double Substitution Encryption Technique with Effective Block Diffusion and Chaos-Induced Noise

7. Cybersecurity capabilities for critical infrastructure resilience

8. Fast Strategies for the Implementation of SIKE Round 3 on ARM Cortex-M4

9. A Reconfigurable Arbiter MPUF With High Resistance Against Machine Learning Attack

10. cuGimli: optimized implementation of the Gimli authenticated encryption and hash function on GPU for IoT applications

11. A Compact Digital Signature Scheme Based on the Module-LWR Problem

12. Determining the longitudinal accuracy and reproducibility of T1 and T2 in a 3T MRI scanner

13. Calibration Standards Verification Procedure Using the Calibration Comparison Technique

14. Verification of the Wafer-Level LRM+ Calibration Technique for GaAs Applications up to 110 GHz

15. Applying the Calibration Comparison Technique for Verification of Transmission Line Standards on Silicon up to 110 GHz

16. ROSE: real one-stage effort to detect the fingerprint singular point based on multi-scale spatial attention

17. Electrically Enhanced Exchange Bias via Solid-State Magneto-ionics

19. Analisis Manajemen Risiko Infrastruktur Dengan Metode NIST (National Institute of Standards and Technology) SP 800-30 (Studi Kasus : STMIK Rosma)

20. Analysis of hardware implementations of electronic signature algorithms qTesla, Crystals-Dilitium and MQDSS at different levels of security

21. A CRP-Space-Extended RRAM PUF With In-Cell Zero-Overhead Salicide-Blocked Contact

22. Modelling cryptographic distinguishers using machine learning

23. Wireless Interference Analysis for Home IoT Security Vulnerability Detection

24. Stumped nature hyperjerk system with fractional order and exponential nonlinearity: Analog simulation, bifurcation analysis and cryptographic applications

25. A Secure Hardware-Assisted AMI Authentication Scheme for Smart Cities

26. Functional Group Identification for FTIR Spectra Using Image-Based Machine Learning Models

27. METHOD FOR DEVELOPING PSEUDO-RANDOM NUMBER GENERATORS FOR CRYPTOGRAPHIC APPLICATIONS IN 5G NETWORKS

28. Modified self-training based statistical models for image classification and speaker identification

29. Rejection Sampling Revisit: How to Choose Parameters in Lattice-Based Signature

30. Kriptografi Audio MP3 Menggunakan RSA dan Transposisi Kolom

31. 2Deep: Enhancing Side-Channel Attacks on Lattice-Based Key-Exchange via 2-D Deep Learning

32. Designing an authenticated Hash function with a 2D chaotic map

33. Cybersecurity Standards in the Context of Operating System

34. The strengths and opportunities for improvement of the Baldrige Performance Excellence Program

35. Breaking LWC candidates: sESTATE and Elephant in quantum setting

36. A normalized signal calibration with a long-term reference improves the robustness of RPLC-MRM/MS lipidomics in plasma

37. Machine translation using deep learning for universal networking language based on their structure

38. A Side-Channel-Resistant Implementation of SABER

39. Research and analysis of implementations of the NIST PQC competition second round candidates focused on the Xilinx FPGA family

40. Ciphertext-Only Attacks Against Compact-LWE Submitted to NIST PQC Project

41. Penerapan Metode Localization Tampering dan Hashing untuk Deteksi Rekayasa Video Digital

42. Design of pseudo-random number generator from turbulence padded chaotic map

43. DEBISim: A simulation pipeline for dual energy CT-based baggage inspection systems1

44. A Trusted Federated System to Share Granular Data Among Disparate Database Resources

45. Acquisition of Digital evidence Android-Based Viber Messenger App

46. Improved El Gamal public key cryptosystem using 3D chaotic maps

47. Efficient Implementation of Cryptographic Arithmetic Primitives Using Reversible Logic and Vedic Mathematics

48. Quantitative MRI using STrategically Acquired Gradient Echo (STAGE): optimization for 1.5 T scanners and T1 relaxation map validation

49. Random Differential Fault Attacks on the Lightweight Authenticated Encryption Stream Cipher Grain-128AEAD

50. A Fully Digital True Random Number Generator With Entropy Source Based in Frequency Collapse

Catalog

Books, media, physical & digital resources