Year of publication
Type of material
Licence
Language
1–20 of 59 hits
Sort by:
Sort by:
-
Embracing “embedded security”: the OSCE's understated but significant role in the European security architecture
Taylor & Francis Verlag | 2015|Keywords: embedded security -
Deep Learning Mitigates but Does Not Annihilate the Need of Aligned Traces and a Generalized ResNet Model For Side-channel Attacks
Free accessBASE | 2020|Keywords: Embedded security -
Comparative analysis of different AES implementation techniques for efficient resource usage and better performance of an FPGA
Free accessDOAJ | 2017|Keywords: Embedded security -
PICO : An Ultra Lightweight and Low Power Encryption Design for Ubiquitous Computing
Online Contents | 2016|Keywords: embedded security -
Deep learning mitigates but does not annihilate the need of aligned traces and a generalized ResNet model for side-channel attacks
Online Contents | 2019|Keywords: Embedded security -
Side-channel countermeasures utilizing dynamic logic reconfiguration: Protecting AES/Rijndael and Serpent encryption in hardware
Elsevier | 2020|Keywords: Embedded security -
High-level synthesis, cryptography, and side-channel countermeasures: A comprehensive evaluation
Elsevier | 2021|Keywords: Embedded security -
Degenerate Fault Attacks on Elliptic Curve Parameters in OpenSSL
Free accessBASE | 2019|Keywords: Embedded security -
Lightweight Datapath Implementation of ANU Cipher for Resource-Constrained Environments
Springer Verlag | 2019|Keywords: Embedded security -
Standard Lattice-Based Key Encapsulation on Embedded Devices
Free accessBASE | 2018|Keywords: embedded security -
Design and Implementation of High Speed AES on a RISC Microcontroller
Springer Verlag | 2017|Keywords: Embedded security -
Secure communication in microcomputer bus systems for embedded devices
Elsevier | 2008|Keywords: Embedded security -
Compact Word-Serial Modular Multiplier Accelerator Structure for Cryptographic Processors in IoT Edge Nodes with Limited Resources
Free accessDOAJ | 2022|Keywords: embedded security -
Physical security analysis of AES implementations on 8-bit MCU and countermeasures
Free accessBASE | 2017|Keywords: Embedded security -
Low-Latency Hardware Masking with Application to AES
Free accessBASE | 2020|Keywords: Embedded Security -
Embedded fuzzing: a review of challenges, tools, and solutions
Free accessSpringer Verlag | 2022|Keywords: Embedded security -
Performance Costs of Software Cryptography in Securing New-Generation Internet of Energy Endpoint Devices
Free accessDOAJ | 2018|Keywords: Embedded Security
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions:
full data search
or
title and abstract search
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
TIB AV portal
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
Specialised Information Service for Mobility and Transport Research (FID move)
Open Research Knowledge Graph (ORKG)
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Common Union Catalogue (GVK)
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.