Search Results - Computer Engineering

  1. Blockchain-enhanced Detection of Malicious Nodes in WSNs Using Parallel Triple Graph Attention-based Convolution Network

    Subjects: “…Technology & EngineeringComputing…”
    Get full text
    Online Article RSS Article
  2. First Fully Pipelined High Throughput FPGA Implementation and GPU Optimization of Wider Variant of AES

    Subjects: “…Technology & EngineeringComputing…”
    Get full text
    Online Article RSS Article
  3. Advancing training stability in unsupervised SEM image segmentation for IC layout extraction

    Subjects: “…Technology & EngineeringComputing…”
    Get full text
    Online Article RSS Article
  4. Implementations of FAST and AEZ on field programmable gate arrays for low level encryption of disks with 4096-byte sectors

    Subjects: “…Technology & EngineeringComputing…”
    Get full text
    Online Article RSS Article
  5. Netlist whisperer: extensive analysis of circuit leakage using LLMs

    Subjects: “…Technology & EngineeringComputing…”
    Get full text
    Online Article RSS Article
  6. Cover chirp jamming: hybrid jamming–deception attack on FMCW radar and its countermeasure

    Subjects: “…Technology & EngineeringComputing…”
    Get full text
    Online Article RSS Article
  7. New lattice-based partial key exposure attacks on common prime RSA

    Subjects: “…Technology & EngineeringComputing…”
    Get full text
    Online Article RSS Article
  8. Friendly primes for efficient modular arithmetic using the Polynomial Modular Number System

    Subjects: “…Technology & EngineeringComputing…”
    Get full text
    Online Article RSS Article
  9. Fast polynomial inversion algorithms for the post-quantum cryptography

    Subjects: “…Technology & EngineeringComputing…”
    Get full text
    Online Article RSS Article
  10. High throughput pipelined implementation of SHA3 hash algorithm on FPGA

    Subjects: “…Technology & EngineeringComputing…”
    Get full text
    Online Article RSS Article
  11. HEProfiler: an in-depth profiler of approximate homomorphic encryption libraries

    Subjects: “…Technology & EngineeringComputing…”
    Get full text
    Online Article RSS Article
  12. A flexible efficient and configurable number theoretic transform architecture implemented on FPGA

    Subjects: “…Technology & EngineeringComputing…”
    Get full text
    Online Article RSS Article
  13. Design methodology of digital sensors for detecting laser fault injection attacks in FPGAs

    Subjects: “…Technology & EngineeringComputing…”
    Get full text
    Online Article RSS Article
  14. Extended version: enabling lattice-based post-quantum cryptography on the opentitan platform

    Subjects: “…Technology & EngineeringComputing…”
    Get full text
    Online Article RSS Article
  15. FOBOS 3: an open-source platform for side-channel analysis and benchmarking

    Subjects: “…Technology & EngineeringComputing…”
    Get full text
    Online Article RSS Article
  16. Remote fault injection attack against cryptographic modules via intentional electromagnetic interference from an antenna

    Subjects: “…Technology & EngineeringComputing…”
    Get full text
    Online Article RSS Article
  17. Evaluation of encrypted matching criteria using homomorphic encryption based FSM

    Subjects: “…Technology & EngineeringComputing…”
    Get full text
    Online Article RSS Article
  18. Best interleave size of GIFT-128 on 64-bit ARM processor

    Subjects: “…Technology & EngineeringComputing…”
    Get full text
    Online Article RSS Article
  19. A side-channel attack on a masked hardware implementation of CRYSTALS-Kyber

    Subjects: “…Technology & EngineeringComputing…”
    Get full text
    Online Article RSS Article
  20. Research and implementation of large-scale S-box for MK-3 algorithm based on polynomial basis: in FPGA

    Subjects: “…Technology & EngineeringComputing…”
    Get full text
    Online Article RSS Article