Side channel and invasive attacks on a secure code execution computer architecture
Addressing human factors in the design of cryptographic solutions: a two-case stud...
Visual cryptography using FPGA for authentication in online transactions
Efficient post-quantum cryptography for building advanced security applications