25 results on '"Künzli, Simon"'
Search Results
2. Attacking secure-element-hardened MCUboot using a low-cost fault injection toolkit
3. Dynamic approach to IoT security : a new security solution for IoT
4. Rust for secure IoT applications : why C is getting rusty
5. A quantitative comparison between Renesas’s Trusted Secure IP cryptographic hardware and secure elements : benchmarking crypto acceleration for IoT (cont.)
6. Surface Properties Acetabular Labrum
7. Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks
8. Distinguishing Attacks on T-Functions
9. A COMPUTER ENGINEERING BENCHMARK APPLICATION FOR MULTIOBJECTIVE OPTIMIZERS
10. Indicator-Based Selection in Multiobjective Search
11. Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks
12. Efficient design space exploration for embedded systems
13. DiMo
14. Combined approach to system level performance analysis of embedded systems
15. Performance evaluation of network processor architectures: combining simulation with analytical estimation
16. Combined approach to system level performance analysis of embedded systems.
17. Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks.
18. A framework for evaluating design tradeoffs in packet processing architectures
19. Schedulability of event-driven code blocks in real-time embedded systems
20. Distinguishing Attacks on T-Functions.
21. Rate analysis for streaming applications with on-chip buffer constraints.
22. A framework for evaluating design tradeoffs in packet processing architectures.
23. Schedulability of event-driven code blocks in real-time embedded systems.
24. Chapter 4 - Design Space Exploration of Network Processor Architectures
25. Workload Characterization Model for Tasks with Variable Execution Demand.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.