Hardware

Results: 39400



#Item
261

Stealthy Dopant-Level Hardware Trojans ? Georg T. Becker1 , Francesco Regazzoni2 , Christof Paar1,3 , and Wayne P. Burleson1

Add to Reading List

Source URL: sharps.org

- Date: 2013-08-11 14:09:07
    262

    High-Speed Hardware Implementations of BLAKE, Blue Midnight Wish, CubeHash, ECHO, Fugue, Grøstl, Hamsi, JH, Keccak, Luffa, Shabal, SHAvite-3, SIMD, and Skein Version 2.0, November 11, 2009 Stefan Tillich, Martin Feldhof

    Add to Reading List

    Source URL: eprint.iacr.org

    - Date: 2009-11-11 12:35:56
      263

      What Is the IT Channel? The Information Technology (IT) industry is made up of professionals who deliver a complex array of hardware, software, communications and services that store, retrieve, manipulate and communicate

      Add to Reading List

      Source URL: www.channel-navigator.com

      - Date: 2013-11-13 10:00:42
        264

        A Novel Paradigm of Parallel Computation and its Use to Implement Simple High-Performance Hardware R. W. Hartenstein, A. G. Hirschbiel, K. Schmidt, M. Weber Universitaet Kaiserslautern, F.B. Informatik, Bau 12, Postfach

        Add to Reading List

        Source URL: www.fpl.uni-kl.de

        - Date: 2013-11-13 04:15:54
          265

          RSA V5 QUICKGUIDE | HARDWARE 2

          Add to Reading List

          Source URL: dev.aaronia-shop.com

          - Date: 2016-11-02 10:33:59
            266

            Generalized, Efficient Array Decision Procedures Leonardo de Moura, Nikolaj Bjørner Abstract—The theory of arrays is ubiquitous in the context of software and hardware verification and symbolic analysis. The basic arr

            Add to Reading List

            Source URL: research.microsoft.com

            - Date: 2009-09-21 16:41:38
              267

              Restoration Hardware Strategy Report Leah Loversky Phil Kantor ILAN Vourman

              Add to Reading List

              Source URL: economics-files.pomona.edu

              - Date: 2013-04-21 17:08:22
                268

                The Influence of Malloc Placement on TSX Hardware Transactional Memory Alex Kogan Tim Harris

                Add to Reading List

                Source URL: www.gsd.inesc-id.pt

                - Date: 2016-03-13 13:04:24
                  269

                  David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware Tal Moran∗ Gil Segev∗

                  Add to Reading List

                  Source URL: eprint.iacr.org

                  - Date: 2008-01-31 10:30:41
                    270

                    Microsoft Word - MEMO_MINUTES Hardware specifications 2013_07.docx

                    Add to Reading List

                    Source URL: www.lightpower-files.de

                    - Date: 2015-11-09 01:12:18
                      UPDATE