The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for 3DES with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2000-2006 (20) 2007-2018 (16) 2020-2023 (9)
Publication types (Num. hits)
article(15) inproceedings(30)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 99 occurrences of 41 keywords

Results
Found 45 publication records. Showing 45 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
60Xiaojun Ruan, Adam Manzanares, Shu Yin, Mais Nijim, Xiao Qin 0001 Can We Improve Energy Efficiency of Secure Disk Systems without Modifying Security Mechanisms? Search on Bibsonomy NAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
47Srivaths Ravi 0001, Anand Raghunathan, Nachiketh R. Potlapally, Murugan Sankaradass System design methodologies for a wireless security processing platform. Search on Bibsonomy DAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF security, performance, embedded system, wireless, encryption, AES, RSA, design methodology, system architecture, platform, DES, IPSec, SSL, decryption, handset, 3DES, security processing
30Deepraj Chowdhury, Ajoy Dey, Ritam Garai, Subhrangshu Adhikary, Ashutosh Dhar Dwivedi, Uttam Ghosh, Waleed S. Alnumay DeCrypt: a 3DES inspired optimised cryptographic algorithm. Search on Bibsonomy J. Ambient Intell. Humaniz. Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
30Kaan Furkan Altinok, Afsin Peker, Cihangir Tezcan, Alptekin Temizel GPU accelerated 3DES encryption. Search on Bibsonomy Concurr. Comput. Pract. Exp. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
30Feng-Hsiag Hsiao Applying 3DES to Chaotic Synchronization Cryptosystems. Search on Bibsonomy IEEE Access The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
30Haneen Khalid Alabdulrazzaq, Mohammed N. Alenezi Performance Evaluation of Cryptographic Algorithms: DES, 3DES, Blowfish, Twofish, and Threefish. Search on Bibsonomy Int. J. Commun. Networks Inf. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
30Cihangir Tezcan Key lengths revisited: GPU-based brute force cryptanalysis of DES, 3DES, and PRESENT. Search on Bibsonomy J. Syst. Archit. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
30Hasan Dibas, Khair Eddin Sabri A comprehensive performance empirical study of the symmetric algorithms: AES, 3DES, Blowfish and Twofish. Search on Bibsonomy ICIT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
30Jianhu Gong Plaintext recovery attack on 3DES algorithm with different byte keys. Search on Bibsonomy J. Intell. Fuzzy Syst. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
30Kaan Furkan Altinok, Afsin Peker, Alptekin Temizel Bit-level Parallelization of 3DES Encryption on GPU. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
30Zhixian Chang, Marcin Wozniak Encryption technology of voice transmission in mobile network based on 3DES-ECC algorithm. Search on Bibsonomy Mob. Networks Appl. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
30Benjamin Kaduk, Michiko Short Deprecate Triple-DES (3DES) and RC4 in Kerberos. Search on Bibsonomy RFC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
30Tomer Ashur, Raluca Posteuca Cryptanalysis of the Full DES and the Full 3DES Using a New Linear Property. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2018 DBLP  BibTeX  RDF
30Yongcheng He, Shuguo Li A 3DES implementation especially for CBC feedback loop mode. Search on Bibsonomy ISCAS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
30Florent Pépin, Maria Grazia Vigliotti Risk Assessment of the 3Des in ERTMS. Search on Bibsonomy RSSRail The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
30Lukasz Swierczewski 3DES ECB Optimized for Massively Parallel CUDA GPU Architecture Search on Bibsonomy CoRR The full citation details ... 2013 DBLP  BibTeX  RDF
30Qian Wang 0022, Liji Wu, Xiangmin Zhang, Xiangyu Li 0002, Jun Guo Efficient Countermeasures against Fault Attacks for 3DES Crypto Engine in Bank IC Card. Search on Bibsonomy CIS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
30Hippolyte Djonon Tsague, Fulufhelo V. Nelwamondo, Ntsika Msimang An Advanced Mutual-authentication Algorithm Using 3DES for Smart Card Systems. Search on Bibsonomy CGC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
30Fang Ren, Leihua Chen, Tao Zhang 3DES Implementation Based on FPGA. Search on Bibsonomy WISM (3) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
30Hamdan O. Alanazi, B. B. Zaidan, A. A. Zaidan 0001, Hamid Abdullah Jalab, Mohamed Shabbir, Yahya Al-Nabhani New Comparative Study Between DES, 3DES and AES within Nine Factors Search on Bibsonomy CoRR The full citation details ... 2010 DBLP  BibTeX  RDF
30Chin Mun Wee, Peter R. Sutton, Neil W. Bergmann An FPGA Network Architecture for Accelerating 3DES - CBC. Search on Bibsonomy FPL The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
30Zan Li, Yilin Chang, Weidong Kou, Lijun Jin, Yumin Wang A family of FH sequences based on 3DES block cipher for FHMA communications. Search on Bibsonomy ICC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
30Shinnosuke Yamaguchi, A. Nishino, Katsumi Wasaki, Yasunari Shidama The design verification for the 3DES encipher chip based on an extended Petri net and XML/Java executor. Search on Bibsonomy ICARCV The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
27Nachiketh R. Potlapally, Srivaths Ravi 0001, Anand Raghunathan, Niraj K. Jha A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF energy analysis, security, embedded system, low-power, AES, RSA, security protocols, ECC, DES, handheld, SSL, Diffie-Hellman, DSA, cryptographic algorithms, 3DES
27H. D. Phaneendra, C. Vidya Raj, M. S. Shivakumar Applying Quantum Search to a Known-Plaintext Attack on Two-Key Triple Encryption. Search on Bibsonomy Intelligent Information Processing The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Quantum algorithm, exhaustive search, Quantum mechanics, qubits, Quantum search, 3DES
27Nachiketh R. Potlapally, Srivaths Ravi 0001, Anand Raghunathan, Niraj K. Jha Analyzing the energy consumption of security protocols. Search on Bibsonomy ISLPED The full citation details ... 2003 DBLP  DOI  BibTeX  RDF energy analysis, security, embedded system, low-power, AES, RSA, security protocols, ECC, DES, handheld, SSL, Diffie-Hellman, DSA, cryptographic algorithms, 3DES
27Anand Raghunathan, Nachiketh R. Potlapally, Srivaths Ravi 0001 Securing Wireless Data: System Architecture Challenges. Search on Bibsonomy ISSS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF WTLS, security, performance, mobile computing, embedded system, wireless communications, encryption, AES, RSA, design methodology, system architecture, platform, DES, IPSec, SSL, decryption, handset, 3DES, security processing
27Hiroto Yasuura, Hiroyuki Tomiyama, Takanori Okuma, Yun Cao Data Memory Design Considering Effective Bitwidth for Low-Energy Embedded Systems. Search on Bibsonomy ISSS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF WTLS, security, performance, mobile computing, embedded system, wireless communications, encryption, AES, RSA, design methodology, system architecture, platform, DES, IPSec, SSL, decryption, handset, 3DES, security processing
20Marian Srebrny, Piotr Such Statistical Strength of a Hybrid Cryptosystem on 2-D Cellular Automata with Nonaffine Rotations. Search on Bibsonomy KES-AMSTA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multi-agent security, intelligent multicore computation, random bit generators, cellular automata, statistical tests, cryptology, symmetric cipher
20Eric Whitman Smith, David L. Dill Automatic Formal Verification of Block Cipher Implementations. Search on Bibsonomy FMCAD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Ricardo Chaves, Blagomir Donchev, Georgi Kuzmanov, Leonel Sousa, Stamatis Vassiliadis BRAM-LUT Tradeoff on a Polymorphic DES Design. Search on Bibsonomy HiPEAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Nachiketh R. Potlapally, Anand Raghunathan, Srivaths Ravi 0001, Niraj K. Jha, Ruby B. Lee Aiding Side-Channel Attacks on Cryptographic Software With Satisfiability-Based Analysis. Search on Bibsonomy IEEE Trans. Very Large Scale Integr. Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Andrew Kingston, Simone Colosimo, Patrizio Campisi, Florent Autrusseau Lossless Image Compression and Selective Encryption using a Discrete Radon Transform. Search on Bibsonomy ICIP (4) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Pedro Malagón, Juan Carlos Vallejo, José Manuel Moya Dynamic environment evaluation for reliable AmI applications based on untrusted sensor. Search on Bibsonomy SECURWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Angelos D. Keromytis, Jason L. Wright, Theo de Raadt, Matthew Burnside Cryptography as an operating system service: A case study. Search on Bibsonomy ACM Trans. Comput. Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF authentication, digital signatures, Encryption, hash functions, cryptographic protocols
20Nachiketh R. Potlapally, Anand Raghunathan, Srivaths Ravi 0001, Niraj K. Jha, Ruby B. Lee Satisfiability-based framework for enabling side-channel attacks on cryptographic software. Search on Bibsonomy DATE Designers' Forum The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Chin Mun Wee, Peter R. Sutton, Neil W. Bergmann, John A. Williams 0001 VPN Acceleration Using Reconfigurable System-On-Chip Technology. Search on Bibsonomy FCCM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Yuh-Hua Hu, Chun-yen Chou, Lih-Chung Wang, Feipei Lai Cryptanalysis of Variants of UOV. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF multivariate quadratic, UOV, XL, digital signature
20Jen-Chieh Lai, Chia-Hui Wang Buffer Occupancy Feedback Security Control and Changing Encryption Keys to Protect MOD Services. Search on Bibsonomy PSIVT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF encryption/decryption, playback buffer occupancy (PBO), feedback control, MOD
20Yi-Neng Lin, Chiuan-Hung Lin, Ying-Dar Lin, Yuan-Cheng Lai VPN Gateways over Network Processors: Implementation and Evaluation. Search on Bibsonomy IEEE Real-Time and Embedded Technology and Applications Symposium The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Ross J. Anderson The Dancing Bear: A New Way of Composing Ciphers. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
20Eric J. Swankoski, Narayanan Vijaykrishnan, Mahmut T. Kandemir, Mary Jane Irwin A Parallel Architecture for Secure FPGA Symmetric Encryption. Search on Bibsonomy IPDPS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
20Dirk Desmet, Prabhat Avasare, Paul Coene, Stijn Decneut, Filip Hendrickx, Théodore Marescaux, Jean-Yves Mignolet, Robert Pasko, Patrick Schaumont, Diederik Verkest Design of Cam-E-leon, a Run-Time Reconfigurable Web Camera. Search on Bibsonomy Embedded Processor Design Challenges The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
20Lisa Wu 0001, Christopher T. Weaver, Todd M. Austin CryptoManiac: a fast flexible architecture for secure communication. Search on Bibsonomy ISCA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
20Jerome Burke, John McDonald, Todd M. Austin Architectural Support for Fast Symmetric-Key Cryptography. Search on Bibsonomy ASPLOS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #45 of 45 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license