LCA14: LCA14-418: Testing a secure framework
LCA14: LCA14-502: The way to a generic TrustZone® solution
Exploiting parallelism opportunities in non-parallel architectures to improve NLFSR software implementations
Models and approaches for Differential Power Analysis
Security & Virtualization in the Data Center
NSC #2 - D2 05 - Andrea Barisani - Forging the USB Armory
Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation
Public-Key Cryptosystems Resilient to Key Leakage - Moni Naor & Gil Segev
S ev2 c17
Breach Detection Systems Buyers Guide
Coding & Crypto Bachelor Colloquium 2013. Cluster: Discrete Mathematics Discrete Mathematics: - Algebra and Geometry - Coding theory and Cryptology -