Personensuche
X
?
Attacks and Defenses for the Internet-of-Things; Lecture Notes in Computer Science ,
2
Evolving a Boolean Masked Adder Using Neuroevolution:
, In:
?
Attacks and Defenses for the Internet-of-Things; Lecture Notes in Computer Science ,
3
The Final Round: Benchmarking NIST LWC Ciphers on Microcont..:
, In:
?
2022 International Conference on Applied Electronics (AE) ,
4
An optimized Bitsliced Masked Adder for ARM Thumb-2 Control..:
, In:
?
Architecture of Computing Systems – ARCS 2020; Lecture Notes in Computer Science ,
8
Equally Distributed Bus-Communication Access Rights for Int..:
, In:
?
Proceedings of the 4th ACM Computer Science in Cars Symposium ,
9
Transport Layer Scanning for Attack Surface Detection in Ve..:
, In:
?
Information and Communications Security; Lecture Notes in Computer Science ,
10
A Hardware in the Loop Benchmark Suite to Evaluate NIST LWC..:
, In:
?
Architecture of Computing Systems – ARCS 2020; Lecture Notes in Computer Science ,
11