|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 99 occurrences of 41 keywords
|
|
|
Results
Found 45 publication records. Showing 45 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
60 | Xiaojun Ruan, Adam Manzanares, Shu Yin, Mais Nijim, Xiao Qin 0001 |
Can We Improve Energy Efficiency of Secure Disk Systems without Modifying Security Mechanisms? |
NAS |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Srivaths Ravi 0001, Anand Raghunathan, Nachiketh R. Potlapally, Murugan Sankaradass |
System design methodologies for a wireless security processing platform. |
DAC |
2002 |
DBLP DOI BibTeX RDF |
security, performance, embedded system, wireless, encryption, AES, RSA, design methodology, system architecture, platform, DES, IPSec, SSL, decryption, handset, 3DES, security processing |
30 | Deepraj Chowdhury, Ajoy Dey, Ritam Garai, Subhrangshu Adhikary, Ashutosh Dhar Dwivedi, Uttam Ghosh, Waleed S. Alnumay |
DeCrypt: a 3DES inspired optimised cryptographic algorithm. |
J. Ambient Intell. Humaniz. Comput. |
2023 |
DBLP DOI BibTeX RDF |
|
30 | Kaan Furkan Altinok, Afsin Peker, Cihangir Tezcan, Alptekin Temizel |
GPU accelerated 3DES encryption. |
Concurr. Comput. Pract. Exp. |
2022 |
DBLP DOI BibTeX RDF |
|
30 | Feng-Hsiag Hsiao |
Applying 3DES to Chaotic Synchronization Cryptosystems. |
IEEE Access |
2022 |
DBLP DOI BibTeX RDF |
|
30 | Haneen Khalid Alabdulrazzaq, Mohammed N. Alenezi |
Performance Evaluation of Cryptographic Algorithms: DES, 3DES, Blowfish, Twofish, and Threefish. |
Int. J. Commun. Networks Inf. Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
30 | Cihangir Tezcan |
Key lengths revisited: GPU-based brute force cryptanalysis of DES, 3DES, and PRESENT. |
J. Syst. Archit. |
2022 |
DBLP DOI BibTeX RDF |
|
30 | Hasan Dibas, Khair Eddin Sabri |
A comprehensive performance empirical study of the symmetric algorithms: AES, 3DES, Blowfish and Twofish. |
ICIT |
2021 |
DBLP DOI BibTeX RDF |
|
30 | Jianhu Gong |
Plaintext recovery attack on 3DES algorithm with different byte keys. |
J. Intell. Fuzzy Syst. |
2020 |
DBLP DOI BibTeX RDF |
|
30 | Kaan Furkan Altinok, Afsin Peker, Alptekin Temizel |
Bit-level Parallelization of 3DES Encryption on GPU. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
30 | Zhixian Chang, Marcin Wozniak |
Encryption technology of voice transmission in mobile network based on 3DES-ECC algorithm. |
Mob. Networks Appl. |
2020 |
DBLP DOI BibTeX RDF |
|
30 | Benjamin Kaduk, Michiko Short |
Deprecate Triple-DES (3DES) and RC4 in Kerberos. |
RFC |
2018 |
DBLP DOI BibTeX RDF |
|
30 | Tomer Ashur, Raluca Posteuca |
Cryptanalysis of the Full DES and the Full 3DES Using a New Linear Property. |
IACR Cryptol. ePrint Arch. |
2018 |
DBLP BibTeX RDF |
|
30 | Yongcheng He, Shuguo Li |
A 3DES implementation especially for CBC feedback loop mode. |
ISCAS |
2017 |
DBLP DOI BibTeX RDF |
|
30 | Florent Pépin, Maria Grazia Vigliotti |
Risk Assessment of the 3Des in ERTMS. |
RSSRail |
2016 |
DBLP DOI BibTeX RDF |
|
30 | Lukasz Swierczewski |
3DES ECB Optimized for Massively Parallel CUDA GPU Architecture |
CoRR |
2013 |
DBLP BibTeX RDF |
|
30 | Qian Wang 0022, Liji Wu, Xiangmin Zhang, Xiangyu Li 0002, Jun Guo |
Efficient Countermeasures against Fault Attacks for 3DES Crypto Engine in Bank IC Card. |
CIS |
2013 |
DBLP DOI BibTeX RDF |
|
30 | Hippolyte Djonon Tsague, Fulufhelo V. Nelwamondo, Ntsika Msimang |
An Advanced Mutual-authentication Algorithm Using 3DES for Smart Card Systems. |
CGC |
2012 |
DBLP DOI BibTeX RDF |
|
30 | Fang Ren, Leihua Chen, Tao Zhang |
3DES Implementation Based on FPGA. |
WISM (3) |
2011 |
DBLP DOI BibTeX RDF |
|
30 | Hamdan O. Alanazi, B. B. Zaidan, A. A. Zaidan 0001, Hamid Abdullah Jalab, Mohamed Shabbir, Yahya Al-Nabhani |
New Comparative Study Between DES, 3DES and AES within Nine Factors |
CoRR |
2010 |
DBLP BibTeX RDF |
|
30 | Chin Mun Wee, Peter R. Sutton, Neil W. Bergmann |
An FPGA Network Architecture for Accelerating 3DES - CBC. |
FPL |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Zan Li, Yilin Chang, Weidong Kou, Lijun Jin, Yumin Wang |
A family of FH sequences based on 3DES block cipher for FHMA communications. |
ICC |
2004 |
DBLP DOI BibTeX RDF |
|
30 | Shinnosuke Yamaguchi, A. Nishino, Katsumi Wasaki, Yasunari Shidama |
The design verification for the 3DES encipher chip based on an extended Petri net and XML/Java executor. |
ICARCV |
2004 |
DBLP DOI BibTeX RDF |
|
27 | Nachiketh R. Potlapally, Srivaths Ravi 0001, Anand Raghunathan, Niraj K. Jha |
A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols. |
IEEE Trans. Mob. Comput. |
2006 |
DBLP DOI BibTeX RDF |
energy analysis, security, embedded system, low-power, AES, RSA, security protocols, ECC, DES, handheld, SSL, Diffie-Hellman, DSA, cryptographic algorithms, 3DES |
27 | H. D. Phaneendra, C. Vidya Raj, M. S. Shivakumar |
Applying Quantum Search to a Known-Plaintext Attack on Two-Key Triple Encryption. |
Intelligent Information Processing |
2006 |
DBLP DOI BibTeX RDF |
Quantum algorithm, exhaustive search, Quantum mechanics, qubits, Quantum search, 3DES |
27 | Nachiketh R. Potlapally, Srivaths Ravi 0001, Anand Raghunathan, Niraj K. Jha |
Analyzing the energy consumption of security protocols. |
ISLPED |
2003 |
DBLP DOI BibTeX RDF |
energy analysis, security, embedded system, low-power, AES, RSA, security protocols, ECC, DES, handheld, SSL, Diffie-Hellman, DSA, cryptographic algorithms, 3DES |
27 | Anand Raghunathan, Nachiketh R. Potlapally, Srivaths Ravi 0001 |
Securing Wireless Data: System Architecture Challenges. |
ISSS |
2002 |
DBLP DOI BibTeX RDF |
WTLS, security, performance, mobile computing, embedded system, wireless communications, encryption, AES, RSA, design methodology, system architecture, platform, DES, IPSec, SSL, decryption, handset, 3DES, security processing |
27 | Hiroto Yasuura, Hiroyuki Tomiyama, Takanori Okuma, Yun Cao |
Data Memory Design Considering Effective Bitwidth for Low-Energy Embedded Systems. |
ISSS |
2002 |
DBLP DOI BibTeX RDF |
WTLS, security, performance, mobile computing, embedded system, wireless communications, encryption, AES, RSA, design methodology, system architecture, platform, DES, IPSec, SSL, decryption, handset, 3DES, security processing |
20 | Marian Srebrny, Piotr Such |
Statistical Strength of a Hybrid Cryptosystem on 2-D Cellular Automata with Nonaffine Rotations. |
KES-AMSTA |
2009 |
DBLP DOI BibTeX RDF |
multi-agent security, intelligent multicore computation, random bit generators, cellular automata, statistical tests, cryptology, symmetric cipher |
20 | Eric Whitman Smith, David L. Dill |
Automatic Formal Verification of Block Cipher Implementations. |
FMCAD |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Ricardo Chaves, Blagomir Donchev, Georgi Kuzmanov, Leonel Sousa, Stamatis Vassiliadis |
BRAM-LUT Tradeoff on a Polymorphic DES Design. |
HiPEAC |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Nachiketh R. Potlapally, Anand Raghunathan, Srivaths Ravi 0001, Niraj K. Jha, Ruby B. Lee |
Aiding Side-Channel Attacks on Cryptographic Software With Satisfiability-Based Analysis. |
IEEE Trans. Very Large Scale Integr. Syst. |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Andrew Kingston, Simone Colosimo, Patrizio Campisi, Florent Autrusseau |
Lossless Image Compression and Selective Encryption using a Discrete Radon Transform. |
ICIP (4) |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Pedro Malagón, Juan Carlos Vallejo, José Manuel Moya |
Dynamic environment evaluation for reliable AmI applications based on untrusted sensor. |
SECURWARE |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Angelos D. Keromytis, Jason L. Wright, Theo de Raadt, Matthew Burnside |
Cryptography as an operating system service: A case study. |
ACM Trans. Comput. Syst. |
2006 |
DBLP DOI BibTeX RDF |
authentication, digital signatures, Encryption, hash functions, cryptographic protocols |
20 | Nachiketh R. Potlapally, Anand Raghunathan, Srivaths Ravi 0001, Niraj K. Jha, Ruby B. Lee |
Satisfiability-based framework for enabling side-channel attacks on cryptographic software. |
DATE Designers' Forum |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Chin Mun Wee, Peter R. Sutton, Neil W. Bergmann, John A. Williams 0001 |
VPN Acceleration Using Reconfigurable System-On-Chip Technology. |
FCCM |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Yuh-Hua Hu, Chun-yen Chou, Lih-Chung Wang, Feipei Lai |
Cryptanalysis of Variants of UOV. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
multivariate quadratic, UOV, XL, digital signature |
20 | Jen-Chieh Lai, Chia-Hui Wang |
Buffer Occupancy Feedback Security Control and Changing Encryption Keys to Protect MOD Services. |
PSIVT |
2006 |
DBLP DOI BibTeX RDF |
encryption/decryption, playback buffer occupancy (PBO), feedback control, MOD |
20 | Yi-Neng Lin, Chiuan-Hung Lin, Ying-Dar Lin, Yuan-Cheng Lai |
VPN Gateways over Network Processors: Implementation and Evaluation. |
IEEE Real-Time and Embedded Technology and Applications Symposium |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Ross J. Anderson |
The Dancing Bear: A New Way of Composing Ciphers. |
Security Protocols Workshop |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Eric J. Swankoski, Narayanan Vijaykrishnan, Mahmut T. Kandemir, Mary Jane Irwin |
A Parallel Architecture for Secure FPGA Symmetric Encryption. |
IPDPS |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Dirk Desmet, Prabhat Avasare, Paul Coene, Stijn Decneut, Filip Hendrickx, Théodore Marescaux, Jean-Yves Mignolet, Robert Pasko, Patrick Schaumont, Diederik Verkest |
Design of Cam-E-leon, a Run-Time Reconfigurable Web Camera. |
Embedded Processor Design Challenges |
2002 |
DBLP DOI BibTeX RDF |
|
20 | Lisa Wu 0001, Christopher T. Weaver, Todd M. Austin |
CryptoManiac: a fast flexible architecture for secure communication. |
ISCA |
2001 |
DBLP DOI BibTeX RDF |
|
20 | Jerome Burke, John McDonald, Todd M. Austin |
Architectural Support for Fast Symmetric-Key Cryptography. |
ASPLOS |
2000 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #45 of 45 (100 per page; Change: )
|
|