1![SMITH - A Parallel Hardware Architecture for fast Gaussian Elimination over GF(2) A. Bogdanov, M.C. Mertens, C. Paar, J. Pelzl, A. Rupp Horst G¨ortz Institute for IT Security, Ruhr University Bochum, Germany {bogdanov,m SMITH - A Parallel Hardware Architecture for fast Gaussian Elimination over GF(2) A. Bogdanov, M.C. Mertens, C. Paar, J. Pelzl, A. Rupp Horst G¨ortz Institute for IT Security, Ruhr University Bochum, Germany {bogdanov,m](https://www.pdfsearch.io/img/1b7cc22dce9e7d76123f9345e5a5d9f2.jpg) | Add to Reading ListSource URL: www.hyperelliptic.orgLanguage: English - Date: 2006-03-21 11:51:07
|
---|
2![Cryptanalysis of KeeLoq with COPACOBANA Martin Novotný1,2, Timo Kasper1 Horst Görtz Institute for IT-Security Ruhr University Bochum 1 Cryptanalysis of KeeLoq with COPACOBANA Martin Novotný1,2, Timo Kasper1 Horst Görtz Institute for IT-Security Ruhr University Bochum 1](https://www.pdfsearch.io/img/4174bea91854d93ee223da334b3e80a9.jpg) | Add to Reading ListSource URL: www.hyperelliptic.orgLanguage: English - Date: 2009-09-22 19:00:54
|
---|
3![On the Security of Elliptic Curve Cryptosystems against Attacks with Special-Purpose Hardware Tim G¨ uneysu, Christof Paar, Jan Pelzl Horst G¨ortz Institute for IT Security, Ruhr University Bochum, Germany {gueneysu,cp On the Security of Elliptic Curve Cryptosystems against Attacks with Special-Purpose Hardware Tim G¨ uneysu, Christof Paar, Jan Pelzl Horst G¨ortz Institute for IT Security, Ruhr University Bochum, Germany {gueneysu,cp](https://www.pdfsearch.io/img/84487eb9f53b5a88bfe644d3e73516ca.jpg) | Add to Reading ListSource URL: www.hyperelliptic.orgLanguage: English - Date: 2006-03-21 11:54:32
|
---|
4![Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks Kai Jansen∗ , Matthias Sch¨afer† , Daniel Moser‡ , Vincent Lenders§ , Christina P¨opper¶ and Jens Schmitt† ∗ Ruhr-Universi Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks Kai Jansen∗ , Matthias Sch¨afer† , Daniel Moser‡ , Vincent Lenders§ , Christina P¨opper¶ and Jens Schmitt† ∗ Ruhr-Universi](https://www.pdfsearch.io/img/317d283c9528b07cf66bb156869ecac5.jpg) | Add to Reading ListSource URL: www.lenders.chLanguage: English - Date: 2018-01-11 04:46:53
|
---|
5![SoK: Exploiting Network Printers Jens Müller, Vladislav Mladenov, Juraj Somorovsky, Jörg Schwenk Horst Görtz Institute for IT-Security, Ruhr University Bochum , , juraj.so SoK: Exploiting Network Printers Jens Müller, Vladislav Mladenov, Juraj Somorovsky, Jörg Schwenk Horst Görtz Institute for IT-Security, Ruhr University Bochum , , juraj.so](https://www.pdfsearch.io/img/7ebe45f359cbe579dc7d66bad698f2b9.jpg) | Add to Reading ListSource URL: www.ieee-security.orgLanguage: English - Date: 2017-04-03 16:01:58
|
---|
6![](/pdf-icon.png) | Add to Reading ListSource URL: www.ifu.ruhr-uni-bochum.de- Date: 2018-04-05 10:05:10
|
---|
7![](/pdf-icon.png) | Add to Reading ListSource URL: www.biologie.ruhr-uni-bochum.de- Date: 2017-02-10 11:14:58
|
---|
8![](/pdf-icon.png) | Add to Reading ListSource URL: www.dekanat-bio.ruhr-uni-bochum.de- Date: 2018-03-05 04:57:29
|
---|
9![](/pdf-icon.png) | Add to Reading ListSource URL: www.dekphil.ruhr-uni-bochum.de- Date: 2018-01-22 05:01:49
|
---|
10![](/pdf-icon.png) | Add to Reading ListSource URL: www.biologie.ruhr-uni-bochum.de- Date: 2018-05-07 09:42:57
|
---|