Search

Your search keyword '"Regazzoni F"' showing total 117 results

Search Constraints

Start Over You searched for: Author "Regazzoni F" Remove constraint Author: "Regazzoni F"
117 results on '"Regazzoni F"'

Search Results

1. Reconstructing relaxed configurations in elastic bodies: Mathematical formulations and numerical methods for cardiac modeling

8. Automatic application of power analysis countermeasures

12. An EDA-friendly protection scheme against side-channel attacks

13. A first step towards automatic application of power analysis countermeasures

14. A design flow and evaluation framework for DPA-resistant instruction set extensions

15. Bias Cancellation of MixColumns

16. CCSW '22: The 2022 cloud computing security workshop

17. CCSW 2022 Chairs' Welcome

18. Post-Quantum Cryptography: Challenges and Opportunities for Robust and Secure HW Design

19. Extending Circuit Design Flow for Early Assessment of Fault Attack Vulnerabilities

21. Machine Learning and Hardware security: Challenges and Opportunities: Invited Talk

22. Latest Trends in Hardware Security and Privacy

23. Friet: An Authenticated Encryption Scheme with Built-in Fault Detection

24. CERBERO: Cross-layer modEl-based fRamework for multi-oBjective dEsign of Reconfigurable systems in unceRtain hybRid envirOnments

25. Recent Developments in Side-Channel Analysis on Elliptic Curve Cryptography Implementations

26. SCA-Resistance for AES: How Cheap Can We Go?

28. SCA-Resistance for AES: How Cheap Can We Go?

30. Cross-layer design of reconfigurable cyber-physical systems

31. Challenges in designing trustworthy cryptographic co-processors

33. Challenges in designing trustworthy cryptographic co-processors

34. Cardis 2012

35. Fresh Re-Keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices

37. Architecture and applications of a high resolution gated SPAD image sensor

38. The Certicom Challenges ECC2-X

39. Breaking ECC2K-130

40. Lattice-based Encryption Over Standard Lattices in Hardware.

41. Fresh Re-Keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices

50. SPAD array camera for localization based super resolution microscopy

Catalog

Books, media, physical & digital resources