![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
5th CS2@HiPEAC 2018: Manchester, UK
- John Goodacre, Mikel Luján, Giovanni Agosta, Alessandro Barenghi, Israel Koren, Gerardo Pelosi:
Proceedings of the Fifth Workshop on Cryptography and Security in Computing Systems, CS2 2018, Manchester, United Kingdom, January 24, 2018. ACM 2018, ISBN 978-1-4503-6374-7 - Halil Kemal Taskin, Murat Cenk
:
Speeding up Curve25519 using Toeplitz Matrix-vector Multiplication. 1-6 - Felipe Valencia
, Tobias Oder, Tim Güneysu
, Francesco Regazzoni
:
Exploring the Vulnerability of R-LWE Encryption to Fault Attacks. 7-12 - Luciano Bozzi, Lorenzo Di Giuseppe, Luigi Pomante
, Marco Pugliese, Marco Santic, Fortunato Santucci, Walter Tiberti
:
TinyWIDS: a WPM-based Intrusion Detection System for TinyOS2.x/802.15.4 Wireless Sensor Networks. 13-16 - Damien Couroussé, Thierno Barry, Bruno Robisson
, Nicolas Belleville, Philippe Jaillon, Olivier Potin, Hélène Le Bouder, Jean-Louis Lanet, Karine Heydemann:
All paths lead to Rome: Polymorphic Runtime Code Generation for Embedded Systems. 17-18 - Flavio D. Garcia:
Automotive Cyber Security: Lessons Learned and Research Challenges. 19 - Alessandro Di Federico:
rev.ng: A Tale of Reverse Engineering, Dynamic Analysis and Translation of Binaries Using QEMU and LLVM. 20
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.