Recherche
Résultats de recherche
Sélectionnez une image pour lancer le diaporama
Investigating the Practical Limits of Rowhammer Attacks
1 de 10
Chaos in Memory: A Comprehensive Analysis of Register and Stack Variable Corruption
2 de 10
A Reinforcement Learning Approach To Optimize the MLC Prefetcher Aggressiveness at Run-Time
3 de 10
µLeech: A Side-Channel Evaluation Platform for Next Generation Trusted Embedded Systems
4 de 10
An Efficient Scheme to Provide Real-time Memory Integrity Protection
5 de 10
Low Power Elliptic Curve Cryptography
6 de 10
Universal Hashing for Ultra-Low-Power Cryptographic Hardware Applications
7 de 10
Efficient Algorithms for Finite Fields, with Applications in Elliptic Curve Cryptography
8 de 10
Versatile Montgomery Multiplier Architectures
9 de 10
Efficient NTRU Implementations
10 de 10