Search Results - "Computer and Cyber Security"

  1. Fast polynomial inversion algorithms for the post-quantum cryptography

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  2. High throughput pipelined implementation of SHA3 hash algorithm on FPGA

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  3. HEProfiler: an in-depth profiler of approximate homomorphic encryption libraries

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  4. A flexible efficient and configurable number theoretic transform architecture implemented on FPGA

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  5. Design methodology of digital sensors for detecting laser fault injection attacks in FPGAs

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  6. Extended version: enabling lattice-based post-quantum cryptography on the opentitan platform

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  7. FOBOS 3: an open-source platform for side-channel analysis and benchmarking

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  8. Remote fault injection attack against cryptographic modules via intentional electromagnetic interference from an antenna

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  9. Evaluation of encrypted matching criteria using homomorphic encryption based FSM

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  10. Best interleave size of GIFT-128 on 64-bit ARM processor

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  11. A side-channel attack on a masked hardware implementation of CRYSTALS-Kyber

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  12. Research and implementation of large-scale S-box for MK-3 algorithm based on polynomial basis: in FPGA

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  13. Application Identification with pfSense, Snort, and OpenAppID in Academic Lab Networks

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  14. Innovations and Applications of Virtual Private Networks and Sustainable Security in Society 5.0 Libraries

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  15. Adopting Artificial Intelligence: Cross-Sector Analysis of AI Adoption Risks

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  16. Enhancing Introductory Cybersecurity Learning: A Design-Based Research Case Study

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  17. Enhancing Cyber Hygiene among Communities through Experiential Cyber-Security Awareness Programs

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  18. Simulating Cyber-Resilience: The Strategic Role of the Locked Shields Exercise in Enhancing International Cyber Preparedness

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  19. Cybersecurity in Higher Education Institutions: Awareness, Policy, and Experience on Employee Behaviour

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article
  20. Cyber Science Education Meets Healthcare Technology

    Subjects: “…Computer and Cyber Security…”
    Get full text
    Online Article RSS Article