Sfoglia per Relatore
Mostrati risultati da 1 a 16 di 16
A methodology based on functional languages for the design of hardware cryptographic primitives resistant to side-channel attacks
2016/2017 DELLEDONNE, LORENZO
An analysis of random probing security properties in masked cryptographic circuits
2021/2022 MANZONI, GIUSEPPE
Characterization of virtualization-induced noise in high-performance computing and real-time virtual machines
2022/2023 Aristei, Francesco
ConceptOS : a micro-kernel approach to over-the-air firmware updates on resource constrained IoT systems
2021/2022 ASPESI, ANDREA
Design and implementation of a domain-specific language for SoC assembly and its compiler
2022/2023 Carrara, Matteo
Design, implementation and validation of a new secure channel protocol for smart cards
2022/2023 BUSHI, JOAN
Efficient attack-surface exploration for electromagnetic fault injection
2021/2022 Carta, Daniele Antonio Emanuele
Evaluating safety implications of virtualization in the automotive field
2022/2023 POZZI, DAVIDE
Fault injection attack on RISC-V
2019/2020 Ala Amjadi, Mohammad
Interruptible remote attestation via performance counters
2021/2022 LI CALSI, DAVIDE
Neural network modeling of a customizable OPENCL stereo matching for a multi-cluster, industrial architecture
2011/2012 VAHABI, NAZANIN
Performance Modelling of an IOMMU for Automotive Embedded Systems
2022/2023 Poggi, Edoardo
Progetto e valutazione di una rete neurale eseguita su un sistema embedded a bassa potenza
2018/2019 CANTINI, ALESSANDRO ELIO
A sponge-based approach to speed up post-quantum signature schemes
2023/2024 Grazioli, Davide
Using design space exploration for analysis and profiling of a video decoding algorithm
2012/2013 KOCABIYIK, EMRE
vETH: first steps towards virtualising multi-channel Ethernet NICs on safety-focused automotive MCUs
2024/2025 Bradatan, Alexandru Gabriel
Mostrati risultati da 1 a 16 di 16
Legenda icone accesso al fulltext
- File accessibili da tutti
- File accessibili dagli utenti autorizzati
- File accessibili da tutti o solo dagli utenti autorizzati, a partire dalla la data indicata nella scheda
- File non accessibili