Ruhr

Results: 4262



#Item
1SMITH - A Parallel Hardware Architecture for fast Gaussian Elimination over GF(2) A. Bogdanov, M.C. Mertens, C. Paar, J. Pelzl, A. Rupp Horst G¨ortz Institute for IT Security, Ruhr University Bochum, Germany {bogdanov,m

SMITH - A Parallel Hardware Architecture for fast Gaussian Elimination over GF(2) A. Bogdanov, M.C. Mertens, C. Paar, J. Pelzl, A. Rupp Horst G¨ortz Institute for IT Security, Ruhr University Bochum, Germany {bogdanov,m

Add to Reading List

Source URL: www.hyperelliptic.org

Language: English - Date: 2006-03-21 11:51:07
2Cryptanalysis of KeeLoq with COPACOBANA Martin Novotný1,2, Timo Kasper1 Horst Görtz Institute for IT-Security Ruhr University Bochum 1

Cryptanalysis of KeeLoq with COPACOBANA Martin Novotný1,2, Timo Kasper1 Horst Görtz Institute for IT-Security Ruhr University Bochum 1

Add to Reading List

Source URL: www.hyperelliptic.org

Language: English - Date: 2009-09-22 19:00:54
3On the Security of Elliptic Curve Cryptosystems against Attacks with Special-Purpose Hardware Tim G¨ uneysu, Christof Paar, Jan Pelzl Horst G¨ortz Institute for IT Security, Ruhr University Bochum, Germany {gueneysu,cp

On the Security of Elliptic Curve Cryptosystems against Attacks with Special-Purpose Hardware Tim G¨ uneysu, Christof Paar, Jan Pelzl Horst G¨ortz Institute for IT Security, Ruhr University Bochum, Germany {gueneysu,cp

Add to Reading List

Source URL: www.hyperelliptic.org

Language: English - Date: 2006-03-21 11:54:32
4Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks Kai Jansen∗ , Matthias Sch¨afer† , Daniel Moser‡ , Vincent Lenders§ , Christina P¨opper¶ and Jens Schmitt† ∗ Ruhr-Universi

Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks Kai Jansen∗ , Matthias Sch¨afer† , Daniel Moser‡ , Vincent Lenders§ , Christina P¨opper¶ and Jens Schmitt† ∗ Ruhr-Universi

Add to Reading List

Source URL: www.lenders.ch

Language: English - Date: 2018-01-11 04:46:53
5SoK: Exploiting Network Printers Jens Müller, Vladislav Mladenov, Juraj Somorovsky, Jörg Schwenk Horst Görtz Institute for IT-Security, Ruhr University Bochum , , juraj.so

SoK: Exploiting Network Printers Jens Müller, Vladislav Mladenov, Juraj Somorovsky, Jörg Schwenk Horst Görtz Institute for IT-Security, Ruhr University Bochum , , juraj.so

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 16:01:58
    6

    PDF Document

    Add to Reading List

    Source URL: www.ifu.ruhr-uni-bochum.de

    - Date: 2018-04-05 10:05:10
      7

      PDF Document

      Add to Reading List

      Source URL: www.biologie.ruhr-uni-bochum.de

      - Date: 2017-02-10 11:14:58
        8

        PDF Document

        Add to Reading List

        Source URL: www.dekanat-bio.ruhr-uni-bochum.de

        - Date: 2018-03-05 04:57:29
          9

          PDF Document

          Add to Reading List

          Source URL: www.dekphil.ruhr-uni-bochum.de

          - Date: 2018-01-22 05:01:49
            10

            PDF Document

            Add to Reading List

            Source URL: www.biologie.ruhr-uni-bochum.de

            - Date: 2018-05-07 09:42:57