|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 99 occurrences of 41 keywords
|
|
|
Results
Found 45 publication records. Showing 45 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
60 | Xiaojun Ruan, Adam Manzanares, Shu Yin, Mais Nijim, Xiao Qin 0001 |
Can We Improve Energy Efficiency of Secure Disk Systems without Modifying Security Mechanisms? ![Search on Bibsonomy](Pics/bibsonomy.png) |
NAS ![In: International Conference on Networking, Architecture, and Storage, NAS 2009, 9-11 July 2009, Zhang Jia Jie, Hunan, China, pp. 413-420, 2009, IEEE Computer Society, 978-0-7695-3741-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Srivaths Ravi 0001, Anand Raghunathan, Nachiketh R. Potlapally, Murugan Sankaradass |
System design methodologies for a wireless security processing platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DAC ![In: Proceedings of the 39th Design Automation Conference, DAC 2002, New Orleans, LA, USA, June 10-14, 2002, pp. 777-782, 2002, ACM, 1-58113-461-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
security, performance, embedded system, wireless, encryption, AES, RSA, design methodology, system architecture, platform, DES, IPSec, SSL, decryption, handset, 3DES, security processing |
30 | Deepraj Chowdhury, Ajoy Dey, Ritam Garai, Subhrangshu Adhikary, Ashutosh Dhar Dwivedi, Uttam Ghosh, Waleed S. Alnumay |
DeCrypt: a 3DES inspired optimised cryptographic algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Ambient Intell. Humaniz. Comput. ![In: J. Ambient Intell. Humaniz. Comput. 14(5), pp. 4745-4755, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
30 | Kaan Furkan Altinok, Afsin Peker, Cihangir Tezcan, Alptekin Temizel |
GPU accelerated 3DES encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Concurr. Comput. Pract. Exp. ![In: Concurr. Comput. Pract. Exp. 34(9), 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
30 | Feng-Hsiag Hsiao |
Applying 3DES to Chaotic Synchronization Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 10, pp. 1036-1050, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
30 | Haneen Khalid Alabdulrazzaq, Mohammed N. Alenezi |
Performance Evaluation of Cryptographic Algorithms: DES, 3DES, Blowfish, Twofish, and Threefish. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Commun. Networks Inf. Secur. ![In: Int. J. Commun. Networks Inf. Secur. 14(1), April 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
30 | Cihangir Tezcan |
Key lengths revisited: GPU-based brute force cryptanalysis of DES, 3DES, and PRESENT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Syst. Archit. ![In: J. Syst. Archit. 124, pp. 102402, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
30 | Hasan Dibas, Khair Eddin Sabri |
A comprehensive performance empirical study of the symmetric algorithms: AES, 3DES, Blowfish and Twofish. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIT ![In: International Conference on Information Technology, ICIT 2021, Amman, Jordan, July 14-15, 2021, pp. 344-349, 2021, IEEE, 978-1-6654-2870-5. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
30 | Jianhu Gong |
Plaintext recovery attack on 3DES algorithm with different byte keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Intell. Fuzzy Syst. ![In: J. Intell. Fuzzy Syst. 38(6), pp. 7487-7495, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
30 | Kaan Furkan Altinok, Afsin Peker, Alptekin Temizel |
Bit-level Parallelization of 3DES Encryption on GPU. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2007.10752, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
30 | Zhixian Chang, Marcin Wozniak |
Encryption technology of voice transmission in mobile network based on 3DES-ECC algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mob. Networks Appl. ![In: Mob. Networks Appl. 25(6), pp. 2398-2408, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
30 | Benjamin Kaduk, Michiko Short |
Deprecate Triple-DES (3DES) and RC4 in Kerberos. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 8429, pp. 1-10, October 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
30 | Tomer Ashur, Raluca Posteuca |
Cryptanalysis of the Full DES and the Full 3DES Using a New Linear Property. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2018, pp. 1219, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
30 | Yongcheng He, Shuguo Li |
A 3DES implementation especially for CBC feedback loop mode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS ![In: IEEE International Symposium on Circuits and Systems, ISCAS 2017, Baltimore, MD, USA, May 28-31, 2017, pp. 1-4, 2017, IEEE, 978-1-4673-6853-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
30 | Florent Pépin, Maria Grazia Vigliotti |
Risk Assessment of the 3Des in ERTMS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RSSRail ![In: Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification - First International Conference, RSSRail 2016, Paris, France, June 28-30, 2016, Proceedings, pp. 79-92, 2016, Springer, 978-3-319-33950-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
30 | Lukasz Swierczewski |
3DES ECB Optimized for Massively Parallel CUDA GPU Architecture ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1305.4376, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
30 | Qian Wang 0022, Liji Wu, Xiangmin Zhang, Xiangyu Li 0002, Jun Guo |
Efficient Countermeasures against Fault Attacks for 3DES Crypto Engine in Bank IC Card. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Ninth International Conference on Computational Intelligence and Security, CIS 2013, Emei Mountain, Sichan Province, China, December 14-15, 2013, pp. 729-733, 2013, IEEE Computer Society, 978-1-4799-2548-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
30 | Hippolyte Djonon Tsague, Fulufhelo V. Nelwamondo, Ntsika Msimang |
An Advanced Mutual-authentication Algorithm Using 3DES for Smart Card Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CGC ![In: 2012 Second International Conference on Cloud and Green Computing, CGC 2012, Xiangtan, Hunan, China, November 1-3, 2012, pp. 660-666, 2012, IEEE Computer Society, 978-1-4673-3027-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
30 | Fang Ren, Leihua Chen, Tao Zhang |
3DES Implementation Based on FPGA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISM (3) ![In: Emerging Research in Web Information Systems and Mining - International Conference, WISM 2011, Taiyuan, China, September 23-25, 2011. Proceedings, pp. 218-224, 2011, Springer, 978-3-642-24272-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
30 | Hamdan O. Alanazi, B. B. Zaidan, A. A. Zaidan 0001, Hamid Abdullah Jalab, Mohamed Shabbir, Yahya Al-Nabhani |
New Comparative Study Between DES, 3DES and AES within Nine Factors ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1003.4085, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
30 | Chin Mun Wee, Peter R. Sutton, Neil W. Bergmann |
An FPGA Network Architecture for Accelerating 3DES - CBC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPL ![In: Proceedings of the 2005 International Conference on Field Programmable Logic and Applications (FPL), Tampere, Finland, August 24-26, 2005, pp. 654-657, 2005, IEEE, 0-7803-9362-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Zan Li, Yilin Chang, Weidong Kou, Lijun Jin, Yumin Wang |
A family of FH sequences based on 3DES block cipher for FHMA communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2004, Paris, France, 20-24 June 2004, pp. 311-315, 2004, IEEE, 0-7803-8533-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
30 | Shinnosuke Yamaguchi, A. Nishino, Katsumi Wasaki, Yasunari Shidama |
The design verification for the 3DES encipher chip based on an extended Petri net and XML/Java executor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICARCV ![In: 8th International Conference on Control, Automation, Robotics and Vision, ICARCV 2004, Kunming, China, 6-9 December 2004, Proceedings, pp. 1994-1999, 2004, IEEE, 0-7803-8653-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
27 | Nachiketh R. Potlapally, Srivaths Ravi 0001, Anand Raghunathan, Niraj K. Jha |
A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Mob. Comput. ![In: IEEE Trans. Mob. Comput. 5(2), pp. 128-143, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
energy analysis, security, embedded system, low-power, AES, RSA, security protocols, ECC, DES, handheld, SSL, Diffie-Hellman, DSA, cryptographic algorithms, 3DES |
27 | H. D. Phaneendra, C. Vidya Raj, M. S. Shivakumar |
Applying Quantum Search to a Known-Plaintext Attack on Two-Key Triple Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Intelligent Information Processing ![In: Intelligent Information Processing III, IFIP TC12 International Conference on Intelligent Information Processing (IIP 2006), September 20-23, Adelaide, Australia, pp. 171-178, 2006, Springer, 978-0-387-44639-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Quantum algorithm, exhaustive search, Quantum mechanics, qubits, Quantum search, 3DES |
27 | Nachiketh R. Potlapally, Srivaths Ravi 0001, Anand Raghunathan, Niraj K. Jha |
Analyzing the energy consumption of security protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISLPED ![In: Proceedings of the 2003 International Symposium on Low Power Electronics and Design, 2003, Seoul, Korea, August 25-27, 2003, pp. 30-35, 2003, ACM, 1-58113-682-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
energy analysis, security, embedded system, low-power, AES, RSA, security protocols, ECC, DES, handheld, SSL, Diffie-Hellman, DSA, cryptographic algorithms, 3DES |
27 | Anand Raghunathan, Nachiketh R. Potlapally, Srivaths Ravi 0001 |
Securing Wireless Data: System Architecture Challenges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSS ![In: Proceedings of the 15th International Symposium on System Synthesis (ISSS 2002), October 2-4, 2002, Kyoto, Japan, pp. 195-200, 2002, ACM / IEEE Computer Society, 1-58113-576-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
WTLS, security, performance, mobile computing, embedded system, wireless communications, encryption, AES, RSA, design methodology, system architecture, platform, DES, IPSec, SSL, decryption, handset, 3DES, security processing |
27 | Hiroto Yasuura, Hiroyuki Tomiyama, Takanori Okuma, Yun Cao |
Data Memory Design Considering Effective Bitwidth for Low-Energy Embedded Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSS ![In: Proceedings of the 15th International Symposium on System Synthesis (ISSS 2002), October 2-4, 2002, Kyoto, Japan, pp. 201-206, 2002, ACM / IEEE Computer Society, 1-58113-576-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
WTLS, security, performance, mobile computing, embedded system, wireless communications, encryption, AES, RSA, design methodology, system architecture, platform, DES, IPSec, SSL, decryption, handset, 3DES, security processing |
20 | Marian Srebrny, Piotr Such |
Statistical Strength of a Hybrid Cryptosystem on 2-D Cellular Automata with Nonaffine Rotations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES-AMSTA ![In: Agent and Multi-Agent Systems: Technologies and Applications, Third KES International Symposium, KES-AMSTA 2009, Uppsala, Sweden, June 3-5, 2009. Proceedings, pp. 367-379, 2009, Springer, 978-3-642-01664-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
multi-agent security, intelligent multicore computation, random bit generators, cellular automata, statistical tests, cryptology, symmetric cipher |
20 | Eric Whitman Smith, David L. Dill |
Automatic Formal Verification of Block Cipher Implementations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMCAD ![In: Formal Methods in Computer-Aided Design, FMCAD 2008, Portland, Oregon, USA, 17-20 November 2008, pp. 1-7, 2008, IEEE, 978-1-4244-2735-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Ricardo Chaves, Blagomir Donchev, Georgi Kuzmanov, Leonel Sousa, Stamatis Vassiliadis |
BRAM-LUT Tradeoff on a Polymorphic DES Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HiPEAC ![In: High Performance Embedded Architectures and Compilers, Third International Conference, HiPEAC 2008, Göteborg, Sweden, January 27-29, 2008, Proceedings, pp. 55-65, 2008, Springer, 978-3-540-77559-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Nachiketh R. Potlapally, Anand Raghunathan, Srivaths Ravi 0001, Niraj K. Jha, Ruby B. Lee |
Aiding Side-Channel Attacks on Cryptographic Software With Satisfiability-Based Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Very Large Scale Integr. Syst. ![In: IEEE Trans. Very Large Scale Integr. Syst. 15(4), pp. 465-470, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Andrew Kingston, Simone Colosimo, Patrizio Campisi, Florent Autrusseau |
Lossless Image Compression and Selective Encryption using a Discrete Radon Transform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP (4) ![In: Proceedings of the International Conference on Image Processing, ICIP 2007, September 16-19, 2007, San Antonio, Texas, USA, pp. 465-468, 2007, IEEE, 978-1-4244-1436-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Pedro Malagón, Juan Carlos Vallejo, José Manuel Moya |
Dynamic environment evaluation for reliable AmI applications based on untrusted sensor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Proceedings of the First International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2007, October 14-20, 2007, Valencia, Spain, pp. 128-131, 2007, IEEE Computer Society, 0-7695-2989-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Angelos D. Keromytis, Jason L. Wright, Theo de Raadt, Matthew Burnside |
Cryptography as an operating system service: A case study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Comput. Syst. ![In: ACM Trans. Comput. Syst. 24(1), pp. 1-38, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
authentication, digital signatures, Encryption, hash functions, cryptographic protocols |
20 | Nachiketh R. Potlapally, Anand Raghunathan, Srivaths Ravi 0001, Niraj K. Jha, Ruby B. Lee |
Satisfiability-based framework for enabling side-channel attacks on cryptographic software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DATE Designers' Forum ![In: Proceedings of the Conference on Design, Automation and Test in Europe: Designers' Forum, DATE 2006, Munich, Germany, March 6-10, 2006, pp. 18-23, 2006, European Design and Automation Association, Leuven, Belgium, 3-9810801-0-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Chin Mun Wee, Peter R. Sutton, Neil W. Bergmann, John A. Williams 0001 |
VPN Acceleration Using Reconfigurable System-On-Chip Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCCM ![In: 14th IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM 2006), 24-26 April 2006, Napa, CA, USA, Proceedings, pp. 281-282, 2006, IEEE Computer Society, 0-7695-2661-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Yuh-Hua Hu, Chun-yen Chou, Lih-Chung Wang, Feipei Lai |
Cryptanalysis of Variants of UOV. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings, pp. 161-170, 2006, Springer, 3-540-38341-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
multivariate quadratic, UOV, XL, digital signature |
20 | Jen-Chieh Lai, Chia-Hui Wang |
Buffer Occupancy Feedback Security Control and Changing Encryption Keys to Protect MOD Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PSIVT ![In: Advances in Image and Video Technology, First Pacific Rim Symposium, PSIVT 2006, Hsinchu, Taiwan, December 10-13, 2006, Proceedings, pp. 888-897, 2006, Springer, 3-540-68297-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
encryption/decryption, playback buffer occupancy (PBO), feedback control, MOD |
20 | Yi-Neng Lin, Chiuan-Hung Lin, Ying-Dar Lin, Yuan-Cheng Lai |
VPN Gateways over Network Processors: Implementation and Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Real-Time and Embedded Technology and Applications Symposium ![In: 11th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS 2005), 7-10 March 2005, San Francisco, CA, USA, pp. 480-486, 2005, IEEE Computer Society, 0-7695-2302-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Ross J. Anderson |
The Dancing Bear: A New Way of Composing Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers, pp. 231-238, 2004, Springer, 3-540-40925-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Eric J. Swankoski, Narayanan Vijaykrishnan, Mahmut T. Kandemir, Mary Jane Irwin |
A Parallel Architecture for Secure FPGA Symmetric Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 18th International Parallel and Distributed Processing Symposium (IPDPS 2004), CD-ROM / Abstracts Proceedings, 26-30 April 2004, Santa Fe, New Mexico, USA, 2004, IEEE Computer Society, 0-7695-2132-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Dirk Desmet, Prabhat Avasare, Paul Coene, Stijn Decneut, Filip Hendrickx, Théodore Marescaux, Jean-Yves Mignolet, Robert Pasko, Patrick Schaumont, Diederik Verkest |
Design of Cam-E-leon, a Run-Time Reconfigurable Web Camera. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Embedded Processor Design Challenges ![In: Embedded Processor Design Challenges: Systems, Architectures, Modeling, and Simulation - SAMOS, pp. 274-290, 2002, Springer, 3-540-43322-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
20 | Lisa Wu 0001, Christopher T. Weaver, Todd M. Austin |
CryptoManiac: a fast flexible architecture for secure communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCA ![In: Proceedings of the 28th Annual International Symposium on Computer Architecture, ISCA 2001, Göteborg, Sweden, June 30-July 4, 2001, pp. 110-119, 2001, ACM, 0-7695-1162-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
20 | Jerome Burke, John McDonald, Todd M. Austin |
Architectural Support for Fast Symmetric-Key Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASPLOS ![In: ASPLOS-IX Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems, Cambridge, MA, USA, November 12-15, 2000., pp. 178-189, 2000, ACM Press, 1-58113-317-0. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #45 of 45 (100 per page; Change: )
|
|