Full Text Available
Access Full Text at Repository
Search Results - Computer Engineering
-
Blockchain-enhanced Detection of Malicious Nodes in WSNs Using Parallel Triple Graph Attention-based Convolution Network
Published in International Journal of Computer Network and Information Security (2026)Subjects: “…Technology & Engineering — Computing…”
Get full text
Online Article RSS Article -
First Fully Pipelined High Throughput FPGA Implementation and GPU Optimization of Wider Variant of AES
Published in Journal of Cryptographic Engineering (2026)Subjects: “…Technology & Engineering — Computing…”
Get full text
-
Advancing training stability in unsupervised SEM image segmentation for IC layout extraction
Published in Journal of Cryptographic Engineering (2025)Subjects: “…Technology & Engineering — Computing…”
Get full text
-
Implementations of FAST and AEZ on field programmable gate arrays for low level encryption of disks with 4096-byte sectors
Published in Journal of Cryptographic Engineering (2025)Subjects: “…Technology & Engineering — Computing…”
Get full text
-
Netlist whisperer: extensive analysis of circuit leakage using LLMs
Published in Journal of Cryptographic Engineering (2025)Subjects: “…Technology & Engineering — Computing…”
Get full text
-
Cover chirp jamming: hybrid jamming–deception attack on FMCW radar and its countermeasure
Published in Journal of Cryptographic Engineering (2025)Subjects: “…Technology & Engineering — Computing…”
Get full text
-
New lattice-based partial key exposure attacks on common prime RSA
Published in Journal of Cryptographic Engineering (2025)Subjects: “…Technology & Engineering — Computing…”
Get full text
-
Friendly primes for efficient modular arithmetic using the Polynomial Modular Number System
Published in Journal of Cryptographic Engineering (2025)Subjects: “…Technology & Engineering — Computing…”
Get full text
-
Fast polynomial inversion algorithms for the post-quantum cryptography
Published in Journal of Cryptographic Engineering (2025)Subjects: “…Technology & Engineering — Computing…”
Get full text
-
High throughput pipelined implementation of SHA3 hash algorithm on FPGA
Published in Journal of Cryptographic Engineering (2025)Subjects: “…Technology & Engineering — Computing…”
Get full text
-
HEProfiler: an in-depth profiler of approximate homomorphic encryption libraries
Published in Journal of Cryptographic Engineering (2025)Subjects: “…Technology & Engineering — Computing…”
Get full text
-
A flexible efficient and configurable number theoretic transform architecture implemented on FPGA
Published in Journal of Cryptographic Engineering (2025)Subjects: “…Technology & Engineering — Computing…”
Get full text
-
Design methodology of digital sensors for detecting laser fault injection attacks in FPGAs
Published in Journal of Cryptographic Engineering (2025)Subjects: “…Technology & Engineering — Computing…”
Get full text
-
Extended version: enabling lattice-based post-quantum cryptography on the opentitan platform
Published in Journal of Cryptographic Engineering (2025)Subjects: “…Technology & Engineering — Computing…”
Get full text
-
FOBOS 3: an open-source platform for side-channel analysis and benchmarking
Published in Journal of Cryptographic Engineering (2025)Subjects: “…Technology & Engineering — Computing…”
Get full text
-
Remote fault injection attack against cryptographic modules via intentional electromagnetic interference from an antenna
Published in Journal of Cryptographic Engineering (2025)Subjects: “…Technology & Engineering — Computing…”
Get full text
-
Evaluation of encrypted matching criteria using homomorphic encryption based FSM
Published in Journal of Cryptographic Engineering (2025)Subjects: “…Technology & Engineering — Computing…”
Get full text
-
Best interleave size of GIFT-128 on 64-bit ARM processor
Published in Journal of Cryptographic Engineering (2025)Subjects: “…Technology & Engineering — Computing…”
Get full text
-
A side-channel attack on a masked hardware implementation of CRYSTALS-Kyber
Published in Journal of Cryptographic Engineering (2025)Subjects: “…Technology & Engineering — Computing…”
Get full text
-
Research and implementation of large-scale S-box for MK-3 algorithm based on polynomial basis: in FPGA
Published in Journal of Cryptographic Engineering (2025)Subjects: “…Technology & Engineering — Computing…”
Get full text