Bochum

Results: 4957



#Item
1SMITH - A Parallel Hardware Architecture for fast Gaussian Elimination over GF(2) A. Bogdanov, M.C. Mertens, C. Paar, J. Pelzl, A. Rupp Horst G¨ortz Institute for IT Security, Ruhr University Bochum, Germany {bogdanov,m

SMITH - A Parallel Hardware Architecture for fast Gaussian Elimination over GF(2) A. Bogdanov, M.C. Mertens, C. Paar, J. Pelzl, A. Rupp Horst G¨ortz Institute for IT Security, Ruhr University Bochum, Germany {bogdanov,m

Add to Reading List

Source URL: www.hyperelliptic.org

Language: English - Date: 2006-03-21 11:51:07
2Cryptanalysis of KeeLoq with COPACOBANA Martin Novotný1,2, Timo Kasper1 Horst Görtz Institute for IT-Security Ruhr University Bochum 1

Cryptanalysis of KeeLoq with COPACOBANA Martin Novotný1,2, Timo Kasper1 Horst Görtz Institute for IT-Security Ruhr University Bochum 1

Add to Reading List

Source URL: www.hyperelliptic.org

Language: English - Date: 2009-09-22 19:00:54
3On the Security of Elliptic Curve Cryptosystems against Attacks with Special-Purpose Hardware Tim G¨ uneysu, Christof Paar, Jan Pelzl Horst G¨ortz Institute for IT Security, Ruhr University Bochum, Germany {gueneysu,cp

On the Security of Elliptic Curve Cryptosystems against Attacks with Special-Purpose Hardware Tim G¨ uneysu, Christof Paar, Jan Pelzl Horst G¨ortz Institute for IT Security, Ruhr University Bochum, Germany {gueneysu,cp

Add to Reading List

Source URL: www.hyperelliptic.org

Language: English - Date: 2006-03-21 11:54:32
4An Efficient Hardware Architecture for Factoring Integers with the Elliptic Curve Method Jens Franke, Thorsten Kleinjung - University of Bonn Christof Paar, Jan Pelzl - University of Bochum Christine Priplata, Colin Stah

An Efficient Hardware Architecture for Factoring Integers with the Elliptic Curve Method Jens Franke, Thorsten Kleinjung - University of Bonn Christof Paar, Jan Pelzl - University of Bochum Christine Priplata, Colin Stah

Add to Reading List

Source URL: www.hyperelliptic.org

Language: English - Date: 2005-03-13 11:15:51
5SoK: Exploiting Network Printers Jens Müller, Vladislav Mladenov, Juraj Somorovsky, Jörg Schwenk Horst Görtz Institute for IT-Security, Ruhr University Bochum , , juraj.so

SoK: Exploiting Network Printers Jens Müller, Vladislav Mladenov, Juraj Somorovsky, Jörg Schwenk Horst Görtz Institute for IT-Security, Ruhr University Bochum , , juraj.so

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 16:01:58
    6

    PDF Document

    Add to Reading List

    Source URL: www.ifu.ruhr-uni-bochum.de

    - Date: 2018-04-05 10:05:10
      7

      PDF Document

      Add to Reading List

      Source URL: www.biologie.ruhr-uni-bochum.de

      - Date: 2017-02-10 11:14:58
        8

        PDF Document

        Add to Reading List

        Source URL: www.dekanat-bio.ruhr-uni-bochum.de

        - Date: 2018-03-05 04:57:29
          9

          PDF Document

          Add to Reading List

          Source URL: www.dekphil.ruhr-uni-bochum.de

          - Date: 2018-01-22 05:01:49
            10

            PDF Document

            Add to Reading List

            Source URL: www.biologie.ruhr-uni-bochum.de

            - Date: 2018-05-07 09:42:57