Full Text Available
Access Full Text at Repository
Search Results - (severity OR security)
-
Ascending stepped cryptanalytic time-memory trade-off
Published in Journal of Cryptographic Engineering (2026)Subjects: “…Computer and Cyber Security…”
Get full text
Online Article RSS Article -
SpoofLearner: Inducing Deceptive Results in Deep Learning SCA via Low-Order Leakage
Published in Journal of Cryptographic Engineering (2026)Subjects: “…Computer and Cyber Security…”
Get full text
-
Faster $$text {GF}(2)[x]$$ polynomial multiplication using SIMD instructions
Published in Journal of Cryptographic Engineering (2026)Subjects: “…Computer and Cyber Security…”
Get full text
-
A fresh look on asymmetric crypto: accelerating WolfSSL on end-nodes processors
Published in Journal of Cryptographic Engineering (2026)Subjects: “…Computer and Cyber Security…”
Get full text
-
Contributions of non-timber forest products to household food security and income around Onigambari forest reserve, Oyo State, Nigeria
Published 2007ArticleFull Text AvailableAccess Repository -
Impact of Root and Tuber Expansion Programme Technology Adoption on Poverty and Food Security Status of Cassava- Farming Households in Southwestern Nigeria
Published 2011ThesisFull Text AvailableAccess Repository -
MULTI-ANALYTIC FACTORS PREDICTING ORGANIZATIONAL CITIZENSHIP BEHAVIOUR AMONG PERSONNEL OF NIGERIA SECURITY AND CIVIL DEFENCE CORPS IN THE SOUTHWEST, NIGERIA
Published 2016-05Subjects: “…Nigeria security and civil defence corps…”
ArticleFull Text AvailableAccess Repository -
Nigeria at hundred: teachers’ and students’ perception of the adequacy of upper basic education social studies curriculum as a tool for national security
Published 2015-06Subjects: “…Students and National Security…”
ArticleFull Text AvailableAccess Repository