Found: 9
Select item for more details and to access through your institution.
Cache-timing attacks without a profiling phase.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2018, v. 26, n. 4, p. 1953, doi. 10.3906/elk-1711-359
- By:
- Publication type:
- Article
Securing fuzzy vault schemes through biometric hashing.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2010, v. 18, n. 4, p. 515, doi. 10.3906/elk-0910-228
- By:
- Publication type:
- Article
Design and implementation of a versatile cryptographic unit for RISC processors.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 1, p. 36, doi. 10.1002/sec.555
- By:
- Publication type:
- Article
Intrusion Detection Over Encrypted Network Data.
- Published in:
- Computer Journal, 2020, v. 63, n. 4, p. 604, doi. 10.1093/comjnl/bxz111
- By:
- Publication type:
- Article
A New Method for Computational Private Information Retrieval.
- Published in:
- Computer Journal, 2017, v. 60, n. 8, p. 1238, doi. 10.1093/comjnl/bxx025
- By:
- Publication type:
- Article
Enhancing an Embedded Processor Core for Efficient and Isolated Execution of Cryptographic Algorithms.
- Published in:
- Computer Journal, 2015, v. 58, n. 10, p. 2368, doi. 10.1093/comjnl/bxu040
- By:
- Publication type:
- Article
A Generic Method for the Analysis of a Class of Cache Attacks: A Case Study for AES.
- Published in:
- 2015
- By:
- Publication type:
- Case Study
Efficient number theoretic transform implementation on GPU for homomorphic encryption.
- Published in:
- Journal of Supercomputing, 2022, v. 78, n. 2, p. 2840, doi. 10.1007/s11227-021-03980-5
- By:
- Publication type:
- Article
A generic Private Information Retrieval scheme with parallel multi‐exponentiations on multicore processors.
- Published in:
- Concurrency & Computation: Practice & Experience, 2018, v. 30, n. 21, p. N.PAG, doi. 10.1002/cpe.4685
- By:
- Publication type:
- Article