Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
Journal of hardware and systems security (source)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(2/171)
Export
export all inquiry results
(2)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article
Chip-to-Chip authentication method based on SRAM PUF and public key cryptography
Karageorgos, Ioannis
;
Isgenc, Mehmet Meric
;
Pagliarini, Samuel Nascimento
;
Pileggi, Larry
Journal of hardware and systems security
2019
/
p. 382–396 : ill
https://doi.org/10.1007/s41635-019-00080-y
journal article
2
journal article
A versatile and flexible multiplier generator for Large integer polynomials
Imran, Malik
;
Abideen, Zain Ul
;
Pagliarini, Samuel Nascimento
Journal of hardware and systems security
2023
/
p. 55–71
https://doi.org/10.1007/s41635-023-00134-2
journal article
Related publications
1
Hardware realization of lattice-based post-quantum cryptography = Võrel põhinev post-kvant-krüptograafia riistvaraline realisatsioon
Number of records 2, displaying
1 - 2
keyword
169
1.
hardware security
2.
hardware security primitive
3.
communicating hardware/software systems
4.
communicating software/hardware systems
5.
software/hardware systems
6.
security systems for military objects
7.
computer hardware
8.
Computer software and hardware
9.
crypto-hardware
10.
DNN hardware accelerator
11.
DNN hardware accelerators
12.
Embedded hardware
13.
hardware
14.
hardware acceleration
15.
hardware accelerator
16.
hardware close programming
17.
hardware customization
18.
hardware design
19.
hardware for the IoT
20.
hardware implementation
21.
hardware in the loop
22.
hardware Obfuscation
23.
hardware problems
24.
hardware rejuvenation
25.
hardware reliability
26.
Hardware Trojan
27.
hardware trojan horse
28.
Hardware Trojan Horses
29.
hardware trojans
30.
Hardware Trojans (HT)
31.
Hardware Verification
32.
hardware/software co-design
33.
hardware-in-the loop simulation
34.
hardware-in-the-loop
35.
Hardware-in-the-Loop simulation
36.
hardware-software integration in robotics
37.
integer-only hardware
38.
open hardware
39.
open source hardware
40.
opensource hardware
41.
open-source hardware
42.
power-hardware-in-the-loop
43.
reconfigurable hardware
44.
software/hardware partitioning
45.
special-purpose hardware
46.
trustworthy hardware
47.
EU-LISA (European Agency for the Operational Management of large-scale IT Systems in the Area of Freedom, Security and Justice)
48.
ad-hoc sensor networks security
49.
Automatic Security Verification
50.
Blockchain security
51.
cache security
52.
cloud security
53.
communication system security
54.
comprehensive system of economic security
55.
computer security
56.
cooperative security dilemma
57.
cyber security
58.
cyber security education
59.
cyber security exercises
60.
cyber security monitoring
61.
cyber security monitoring in maritime
62.
cyber security strategies
63.
cyber-physical system security
64.
cyber-security
65.
data and information security
66.
data security
67.
development of security cameras
68.
digital security practices
69.
drinking water security
70.
economic security
71.
economic security of enterprise
72.
emotional security
73.
energy security
74.
energy security indicator
75.
Estonian information security standard
76.
graded security
77.
high level of security
78.
Homeland security
79.
human security
80.
information security
81.
information security and privacy
82.
initial level of security
83.
internal security
84.
international security
85.
investment and innovation security
86.
IPv6 security
87.
IT security
88.
IT security management
89.
job security
90.
long-term security
91.
maritime cyber security
92.
maritime cyber security operations centers
93.
Maritime Security Operations Center (M-SOC)
94.
medium level of security
95.
metadata model for security measures
96.
Middle Eastern security
97.
Mobile security
98.
national cyber security strategy
99.
national security
100.
NATO. Science for Peace and Security Program
101.
network security
102.
network security monitoring
103.
OSCE (Organization for Security and Co-operation in Europe)
104.
passenger’s security
105.
policy-based routing security
106.
political and security cultures
107.
post-quantum security
108.
power system security
109.
quantitative security
110.
regional security
111.
RISC-V Security Verification
112.
safety and security in sea transportation
113.
safety and security testing
114.
security
115.
security adaptation
116.
security alert prioritization
117.
security analysis
118.
security and justice (AFSJ)
119.
Security and political science
120.
security and privacy
121.
security and privacy in smart grids
122.
Security Assertion
123.
Security Assertion Mining
124.
security closure
125.
Security Coverage
126.
security dataset
127.
security dilemma
128.
Security evaluation
129.
security evaluation instruments
130.
Security Level Evaluation
131.
Security limitations
132.
security log analysis
133.
security management
134.
security model
135.
security monitoring
136.
security notion
137.
security objectives
138.
security of data
139.
security of supply
140.
security operation center
141.
security operations center
142.
security patterns
143.
security policy
144.
security problem definition
145.
security proof
146.
security protocols
147.
security requirements
148.
security requirements engineering
149.
security research
150.
security risk assessment
151.
security risk management
152.
security risks
153.
security science and technology
154.
security strategies
155.
security testing
156.
security training
157.
security verification
158.
security-by-design
159.
social security planning
160.
societal security
161.
software security
162.
software security level
163.
software security subcharacteristics
164.
sufficient level of security
165.
system of economic security
166.
system security
167.
terrorism security
168.
transmission System Security
169.
voting privacy and security
subject term
2
1.
National Computer Security Incident Response Teams (N-CSIRTs)
2.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT