1![Optimizing S-box Implementations for Several Criteria using SAT Solvers Ko Stoffelen Radboud University, Digital Security, Nijmegen, The Netherlands Optimizing S-box Implementations for Several Criteria using SAT Solvers Ko Stoffelen Radboud University, Digital Security, Nijmegen, The Netherlands](https://www.pdfsearch.io/img/fece93a035981ed744a0dea256a1f02e.jpg) | Add to Reading ListSource URL: ko.stoffelen.nlLanguage: English - Date: 2018-02-09 07:40:06
|
---|
2![Hash-based signatures Joost Rijneveld Radboud University, Nijmegen, The Netherlands Post-quantum cryptography Hash-based signatures Joost Rijneveld Radboud University, Nijmegen, The Netherlands Post-quantum cryptography](https://www.pdfsearch.io/img/388481bc8b99f1e553b50c2ecb85de90.jpg) | Add to Reading ListSource URL: joostrijneveld.nlLanguage: English - Date: 2018-06-21 04:41:26
|
---|
3![Implementing Post-Quantum Cryptography on the Cortex M4 Matthias Kannwischer, Joost Rijneveld, Peter Schwabe, and Ko Stoffelen Radboud University, Nijmegen, The Netherlands Implementing Post-Quantum Cryptography on the Cortex M4 Matthias Kannwischer, Joost Rijneveld, Peter Schwabe, and Ko Stoffelen Radboud University, Nijmegen, The Netherlands](https://www.pdfsearch.io/img/3341552624aac04a2d2bbe652054051d.jpg) | Add to Reading ListSource URL: joostrijneveld.nlLanguage: English - Date: 2018-09-12 10:43:16
|
---|
4![All the AES You Need on Cortex-M3 and M4 Peter Schwabe and Ko Stoffelen Radboud University, Digital Security Group, Nijmegen, The Netherlands , All the AES You Need on Cortex-M3 and M4 Peter Schwabe and Ko Stoffelen Radboud University, Digital Security Group, Nijmegen, The Netherlands ,](https://www.pdfsearch.io/img/6455f8634946e6c7dfb56013533d5790.jpg) | Add to Reading ListSource URL: ko.stoffelen.nlLanguage: English - Date: 2018-02-09 07:40:08
|
---|
5![Column Parity Mixers Ko Stoffelen1∗ and Joan Daemen1,2 1 Digital Security Group, Radboud University, Nijmegen, The Netherlands 2 Column Parity Mixers Ko Stoffelen1∗ and Joan Daemen1,2 1 Digital Security Group, Radboud University, Nijmegen, The Netherlands 2](https://www.pdfsearch.io/img/dc152cb9d39f06db5a8c4b6715156e27.jpg) | Add to Reading ListSource URL: ko.stoffelen.nlLanguage: English - Date: 2018-03-09 10:10:48
|
---|
6![Differential Power Analysis and Fault Attacks on Hash-Based Signature Schemes Matthias J. Kannwischer 27 March 2018 Radboud University, Nijmegen, The Netherlands Differential Power Analysis and Fault Attacks on Hash-Based Signature Schemes Matthias J. Kannwischer 27 March 2018 Radboud University, Nijmegen, The Netherlands](https://www.pdfsearch.io/img/389df3d25a8cacd8e0190e903df223f8.jpg) | Add to Reading ListSource URL: kannwischer.euLanguage: English - Date: 2018-03-26 10:26:09
|
---|
7![Learning-Based Testing the Sliding Window Behavior of TCP Implementations Paul Fiter˘au-Bro¸stean?1 and Falk Howar2 1 Institute for Computing and Information Sciences, Radboud University, Nijmegen, Learning-Based Testing the Sliding Window Behavior of TCP Implementations Paul Fiter˘au-Bro¸stean?1 and Falk Howar2 1 Institute for Computing and Information Sciences, Radboud University, Nijmegen,](https://www.pdfsearch.io/img/a549dab256be23a6ad9860856964b7c2.jpg) | Add to Reading ListSource URL: www.falkhowar.deLanguage: English - Date: 2018-09-30 08:43:02
|
---|
8![Instruction Scheduling and Register Allocation on ARM Cortex-M Ko Stoffelen Radboud University, Digital Security Group, Nijmegen, The Netherlands Instruction Scheduling and Register Allocation on ARM Cortex-M Ko Stoffelen Radboud University, Digital Security Group, Nijmegen, The Netherlands](https://www.pdfsearch.io/img/0e7e64c0c459104c77952b69f6fa20fa.jpg) | Add to Reading ListSource URL: ko.stoffelen.nlLanguage: English - Date: 2018-02-09 07:40:08
|
---|
9![Efficient U-Prove Implementation for Anonymous Credentials on Smart Cards Wojciech Mostowski? and Pim Vullers?? Institute for Computing and Information Sciences, Digital Security group, Radboud University Nijmegen, The N Efficient U-Prove Implementation for Anonymous Credentials on Smart Cards Wojciech Mostowski? and Pim Vullers?? Institute for Computing and Information Sciences, Digital Security group, Radboud University Nijmegen, The N](https://www.pdfsearch.io/img/90c7d3fffd2a37c062d5631e85b226d2.jpg) | Add to Reading ListSource URL: ceres.hh.seLanguage: English - Date: 2015-05-16 14:56:14
|
---|
10![How did Homo Heuristicus become ecologically rational? Maria Otworowska ()a, Marieke Sweersa , Robin Wellnera , Marvin Uhlmannb , Todd Warehamc , Iris van Rooija a Radboud University Nijmegen, D How did Homo Heuristicus become ecologically rational? Maria Otworowska ()a, Marieke Sweersa , Robin Wellnera , Marvin Uhlmannb , Todd Warehamc , Iris van Rooija a Radboud University Nijmegen, D](https://www.pdfsearch.io/img/ddd3cf9d492d864091112c2575adbda7.jpg) | Add to Reading ListSource URL: ceur-ws.orgLanguage: English - Date: 2015-08-07 07:25:17
|
---|