Options
Fraunhofer-Institut für Angewandte und Integrierte Sicherheit AISEC
Mobile Contactless Fingerprint Recognition: Implementation, Performance and Usability Aspects
Finding the Needle in the Haystack: Metrics for Best Trace Selection in Unsupervised Side-Channel Attacks on Blinded RSA
A Systematic Review on Model Watermarking for Neural Networks
SCA secure and updatable crypto engines for FPGA SoC bitstream decryption: extended version
Breaking TrustZone memory isolation and secure boot through malicious hardware on a modern FPGA-SoC
Security and trust in open source security tokens
Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber
The Stream Exchange Protocol: A Secure and Lightweight Tool for Decentralized Connection Establishment
Machine learning of physical unclonable functions using helper data. Revealing a pitfall in the fuzzy commitment scheme
DOMREP-An Orthogonal Countermeasure for Arbitrary Order Side-Channel and Fault Attack Protection