139 papers found
Refreshing results…
Post-Quantum Lattice-Based Cryptography Implementations
Tool of Spies: Leaking your IP by Altering the 3D Printer Compiler
CERBERO: Cross-layer modEl-based fRamework for multi-oBjective dEsign of reconfigurable systems in unceRtain hybRid envirOnments
Fault Sensitivity Analysis of Lattice-Based Post-Quantum Cryptographic Components
Power & performance optimized hardware classifiers for efficient on-device malware detection
The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Evaluations
Customized Instructions for Protection Against Memory Integrity Attacks
Securing Hardware Accelerators: A New Challenge for High-Level Synthesis
Active contraction of cardiac cells: a reduced model for sarcomere dynamics with cooperative interactions
TAO: techniques for algorithm-level obfuscation during high-level synthesis
Towards Low Energy Stream Ciphers
Physical Protection of Lattice-Based Cryptography: Challenges and Solutions
Compact, Scalable, and Efficient Discrete Gaussian Samplers for Lattice-Based Cryptography
Inverse gating for low energy encryption
Rethinking Secure FPGAs: Towards a Cryptography-Friendly Configurable Cell Architecture and Its Automated Design Flow
SCA-Resistance for AES: How Cheap Can We Go?
Security
ASHES 2018- Workshop on Attacks and Solutions in Hardware Security
TaintHLS: High-Level Synthesis For Dynamic Information Flow Tracking
Exploring the Vulnerability of R-LWE Encryption to Fault Attacks
Missing publications? Read more about our data sources.