117 results on '"Helena Handschuh"'
Search Results
2. Efficient Implementation of True Random Number Generator Based on SRAM PUFs.
3. Hardware intrinsic security from D flip-flops.
4. Hardware Intrinsic Security from Physically Unclonable Functions.
5. Blinded Fault Resistant Exponentiation Revisited.
6. Symmetric Cryptography (Dagstuhl Seminar 14021).
7. Securing Flash Technology: How Does It Look From Inside?
8. Masking Does Not Protect Against Differential Fault Attacks.
9. Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms.
10. High Density Smart Cards: New Security Challenges and Applications.
11. Securing Flash Technology.
12. Blind Differential Cryptanalysis for Enhanced Power Attacks.
13. Hardware Security Features for Secure Embedded Devices.
14. On Related-Key and Collision Attacks: The Case for the IBM 4758 Cryptoprocessor.
15. Security Analysis of SHA-256 and Sisters.
16. Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages.
17. GEM: A Generic Chosen-Ciphertext Secure Encryption Method.
18. Fast Primitives for Internal Data Scrambling in Tamper Resistant Hardware.
19. Analysis of SHA-1 in Encryption Mode.
20. Hardware-Anchored Security Based on SRAM PUFs, Part 1.
21. A Statistical Attack on RC6.
22. ECC: Do We Need to Count?
23. Probing Attacks on Tamper-Resistant Devices.
24. A Universal Encryption Standard.
25. Decision Oracles are Equivalent to Matching Oracles.
26. On the Security of Double and 2-Key Triple Modes of Operation.
27. Smart Card Crypto-Coprocessors for Public-Key Cryptography.
28. Reducing the Collision Probability of Alleged Comp128.
29. A Timing Attack on RC5.
30. x2 Cryptanalysis of the SEAL Encryption Algorithm.
31. Introduction to the CHES 2015 special issue.
32. 09031 Abstracts Collection - Symmetric Cryptography.
33. 09031 Executive Summary - Symmetric Cryptography.
34. 07021 Executive Summary -- Symmetric Cryptography.
35. 07021 Abstracts Collection -- Symmetric Cryptography.
36. Provably Secure Chipcard Personalization, or, How to Fool Malicious Insiders.
37. Advances in Cryptology – CRYPTO 2023 : 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023, Proceedings, Part II
38. Advances in Cryptology – CRYPTO 2023 : 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023, Proceedings, Part V
39. Hardware intrinsic security based on SRAM PUFs: Tales from the industry.
40. Hardware-Anchored Security Based on SRAM PUFs, Part 2.
41. Fault Resistant RSA Signatures: Chinese Remaindering in Both Directions.
42. Mobile Terminal Security.
43. Topics in Cryptology – CT-RSA 2017 : The Cryptographers’ Track at the RSA Conference 2017, San Francisco, CA, USA, February 14–17, 2017, Proceedings
44. Cryptographic Hardware and Embedded Systems -- CHES 2015 : 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings
45. SHA-0, SHA-1, SHA-2 (Secure Hash Algorithm).
46. Cryptographic Hardware and Embedded Systems -- CHES 2015
47. Efficient Implementation of True Random Number Generator Based on SRAM PUFs
48. RC6
49. Secure Audit Logs
50. Search over Encrypted Data
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.