|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 46 occurrences of 37 keywords
|
|
|
Results
Found 53 publication records. Showing 53 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
114 | Fengtong Wen, Wenling Wu, Qiaoyan Wen |
Error Oracle Attacks on Several Modes of Operation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS (2) ![In: Computational Intelligence and Security, International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II, pp. 62-67, 2005, Springer, 3-540-30819-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
110 | Chris J. Mitchell |
Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings, pp. 244-258, 2005, Springer, 3-540-29001-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
108 | Arnold K. L. Yau, Kenneth G. Paterson, Chris J. Mitchell |
Padding Oracle Attacks on CBC-Mode Encryption with Secret and Random IVs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption: 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers, pp. 299-319, 2005, Springer, 3-540-26541-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
padding oracle, CBC-mode, side channel, ISO standards |
108 | Kenneth G. Paterson, Arnold K. L. Yau |
Padding Oracle Attacks on the ISO CBC Mode Encryption Standard. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2004, The Cryptographers' Track at the RSA Conference 2004, San Francisco, CA, USA, February 23-27, 2004, Proceedings, pp. 305-323, 2004, Springer, 3-540-20996-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
padding oracle attack, CBC-mode encryption, ISO standard |
93 | Kenneth G. Paterson, Gaven J. Watson |
Immunising CBC Mode Against Padding Oracle Attacks: A Formal Security Treatment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks, 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings, pp. 340-357, 2008, Springer, 978-3-540-85854-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
82 | Yevgeniy Dodis, Krzysztof Pietrzak, Prashant Puniya |
A New Mode of Operation for Block Ciphers and Length-Preserving MACs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings, pp. 198-219, 2008, Springer, 978-3-540-78966-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
72 | Keting Jia, Xiaoyun Wang 0001, Zheng Yuan, Guangwu Xu |
Distinguishing and Second-Preimage Attacks on CBC-Like MACs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings, pp. 349-361, 2009, Springer, 978-3-642-10432-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
CBC, MAC, Distinguishing attack, Second preimage attack |
62 | Praveen Dongara, T. N. Vijaykumar |
Accelerating private-key cryptography via multithreading on symmetric multiprocessors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPASS ![In: 2003 IEEE International Symposium on Performance Analysis of Systems and Software, March 6-8, 2003, Austin, Texas, USA, Proceedings, pp. 58-69, 2003, IEEE Computer Society, 0-7803-7756-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
59 | Ivan Damgård, Jesper Buus Nielsen |
Expanding Pseudorandom Functions; or: From Known-Plaintext Security to Chosen-Plaintext Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2002, 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002, Proceedings, pp. 449-464, 2002, Springer, 3-540-44050-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
49 | Danilo Gligoroski, Suzana Andova, Svein J. Knapskog |
On the Importance of the Key Separation Principle for Different Modes of Operation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings, pp. 404-418, 2008, Springer, 978-3-540-79103-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
quasigroup string transformations, block ciphers, modes of operation |
49 | Richard M. Dansereau, S. Jin, Rafik A. Goubran |
Reducing Packet Loss in CBC Secured VoIP using Interleaved Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCECE ![In: Proceedings of the Canadian Conference on Electrical and Computer Engineering, CCECE 2006, May 7-10, 2006, Ottawa Congress Centre, Ottawa, Canada, pp. 1320-1324, 2006, IEEE, 1-4244-0038-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
49 | Yuliang Zheng 0001, Yongge Wang |
Efficient and provably secure ciphers for storage device block level encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
StorageSS ![In: Proceedings of the 2005 ACM Workshop On Storage Security And Survivability, StorageSS 2005, Fairfax, VA, USA, November 11, 2005, pp. 103-107, 2005, ACM, 1-59593-233-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
storage device encryption, hash function, symmetric cipher |
42 | Véronique Cortier, Michaël Rusinowitch, Eugen Zalinescu |
A resolution strategy for verifying cryptographic protocols with CBC encryption and blind signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PPDP ![In: Proceedings of the 7th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming, July 11-13 2005, Lisbon, Portugal, pp. 12-22, 2005, ACM, 1-59593-090-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
resolution strategies, verification, cryptographic protocols, horn clauses |
36 | Eli Biham |
Cryptanalysis of Multiple Modes of Operation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 11(1), pp. 45-58, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Block ciphers, Block ciphers, Modes of operation, Modes of operation, Key words, Multiple modes, Multiple modes |
36 | Eli Biham |
Cryptanalysis of Multiple Modes of Operation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28 - December 1, 1994, Proceedings, pp. 278-292, 1994, Springer, 3-540-59339-X. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
33 | Sumio Morioka, Akashi Satoh |
A 10-Gbps full-AES crypto design with a twisted BDD S-Box architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Very Large Scale Integr. Syst. ![In: IEEE Trans. Very Large Scale Integr. Syst. 12(7), pp. 686-691, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
33 | Sumio Morioka, Akashi Satoh |
A 10 Gbps Full-AES Crypto Design with a Twisted-BDD S-Box Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCD ![In: 20th International Conference on Computer Design (ICCD 2002), VLSI in Computers and Processors, 16-18 September 2002, Freiburg, Germany, Proceedings, pp. 98-103, 2002, IEEE Computer Society, 0-7695-1700-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
27 | Zhanna Alimzhanova, Maria Skublewska-Paszkowska, Dauren Nazarbayev |
Periodicity Detection of the Substitution Box in the CBC Mode of Operation: Experiment and Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 11, pp. 75686-75695, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Punam Kumari, Bhaskar Mondal |
Lightweight image encryption algorithm using NLFSR and CBC mode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Supercomput. ![In: J. Supercomput. 79(17), pp. 19452-19472, November 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Yuanjian Li, Chunhe Song, Jingya Dong, Hao Zheng |
An efficient encryption method for smart grid data based on improved CBC mode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. King Saud Univ. Comput. Inf. Sci. ![In: J. King Saud Univ. Comput. Inf. Sci. 35(9), pp. 101744, October 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Aleksejus Mihalkovich, Matas Levinskas, Lina Dindiene, Eligijus Sakalauskas |
CBC Mode of MPF Based Shannon Cipher Defined Over a Non-Commuting Platform Group. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Informatica ![In: Informatica 33(4), pp. 833-856, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Abdessalem Abidi, Samar Tawbi, Christophe Guyeux, Belgacem Bouallegue, Mohsen Machhout |
Summary of Topological Study of Chaotic CBC Mode of Operation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1708.03243, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
27 | Abdessalem Abidi, Christophe Guyeux, Jacques Demerjian, Belagacem Bouallegue, Mohsen Machhout |
Lyapunov Exponent Evaluation of the CBC Mode of Operation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1706.08099, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
27 | Abdessalem Abidi, Christophe Guyeux, Belgacem Bouallegue, Mohsen Machhout |
Conditions to Have a Well-Disordered Dynamics in the CBC Mode of Operation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AICCSA ![In: 14th IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2017, Hammamet, Tunisia, October 30 - Nov. 3, 2017, pp. 226-231, 2017, IEEE Computer Society, 978-1-5386-3581-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
27 | Abdessalem Abidi, Qianxue Wang, Belgacem Bouallegue, Mohsen Machhout, Christophe Guyeux |
Proving Chaotic Behavior of CBC Mode of Operation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Bifurc. Chaos ![In: Int. J. Bifurc. Chaos 26(7), pp. 1650113:1-1650113:10, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
27 | Takashi Kurokawa 0001, Ryo Nojima, Shiho Moriai |
On the security of CBC Mode in SSL3.0 and TLS1.0. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Internet Serv. Inf. Secur. ![In: J. Internet Serv. Inf. Secur. 6(1), pp. 2-19, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
27 | Abdessalem Abidi, Qianxue Wang, Belgacem Bouallegue, Mohsen Machhout, Christophe Guyeux |
Quantitative Evaluation of Chaotic CBC Mode of Operation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1601.08139, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
27 | Abdessalem Abidi, Qianxue Wang, Belgacem Bouallegue, Mohsen Machhout, Christophe Guyeux |
Proving chaotic behaviour of CBC mode of operation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1608.05838, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
27 | Abdessalem Abidi, Christophe Guyeux, Bechara al Bouna, Belgacem Bouallegue, Mohsen Machhout |
The dynamics of the CBC Mode of Operation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1605.02950, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
27 | Rei Ueno, Sumio Morioka, Naofumi Homma, Takafumi Aoki |
A High Throughput/Gate AES Hardware Architecture by Compressing Encryption and Decryption Datapaths - Toward Efficient CBC-Mode Implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2016, pp. 595, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
27 | Abdessalem Abidi, Qianxue Wang, Belgacem Bouallegue, Mohsen Machhout, Christophe Guyeux |
Quantitative evaluation of chaotic CBC mode of operation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATSIP ![In: 2nd International Conference on Advanced Technologies for Signal and Image Processing, ATSIP 2016, Monastir, Tunisia, March 21-23, 2016, pp. 88-92, 2016, IEEE, 978-1-4673-8526-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
27 | Abdessalem Abidi, Samar Tawbi, Christophe Guyeux, Belgacem Bouallegue, Mohsen Machhout |
Summary of Topological Study of Chaotic CBC Mode of Operation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE/EUC/DCABES ![In: 2016 IEEE Intl Conference on Computational Science and Engineering, CSE 2016, and IEEE Intl Conference on Embedded and Ubiquitous Computing, EUC 2016, and 15th Intl Symposium on Distributed Computing and Applications for Business Engineering, DCABES 2016, Paris, France, August 24-26, 2016, pp. 436-443, 2016, IEEE Computer Society, 978-1-5090-3593-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
27 | Rei Ueno, Sumio Morioka, Naofumi Homma, Takafumi Aoki |
A High Throughput/Gate AES Hardware Architecture by Compressing Encryption and Decryption Datapaths - Toward Efficient CBC-Mode Implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings, pp. 538-558, 2016, Springer, 978-3-662-53139-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
27 | Takashi Kurokawa 0001, Ryo Nojima, Shiho Moriai |
Can We Securely Use CBC Mode in TLS1.0? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICT-EurAsia/CONFENIS ![In: Information and Communication Technology - Third IFIP TC 5/8 International Conference, ICT-EurAsia 2015, and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015, Held as Part of WCC 2015, Daejeon, Korea, October 4-7, 2015, Proceedings, pp. 151-160, 2015, Springer, 978-3-319-24314-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
27 | Vlastimil Klíma, Tomás Rosa |
Strengthened Encryption in the CBC Mode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2002, pp. 61, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
27 | Roy Pereira, Rob Adams |
The ESP CBC-Mode Cipher Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 2451, pp. 1-14, November 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
27 | Devesh C. Jinwala, Dhiren R. Patel, Kankar S. Dasgupta |
Optimizing the Block Cipher and Modes of Operations Overhead at the Link Layer Security Framework in the Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedings, pp. 258-272, 2008, Springer, 978-3-540-89861-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Wireless Sensor Networks, Authentication, Encryption, Block Ciphers, Link Layer Security |
27 | Erik Anderson, Cheryl L. Beaver, Timothy Draelos, Richard Schroeppel, Mark Torgerson |
ManTiCore: Encryption with Joint Cipher-State Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings, pp. 440-453, 2004, Springer, 3-540-22379-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Encryption Mode, Inexpensive Authentication, Luby-Rackoff, Feistel, Middletext, Hash, Cipher |
23 | Jonathan Katz, Moti Yung |
Unforgeable Encryption and Chosen Ciphertext Secure Modes of Operation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 7th International Workshop, FSE 2000, New York, NY, USA, April 10-12, 2000, Proceedings, pp. 284-299, 2000, Springer, 3-540-41728-1. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
20 | Moses D. Liskov, Ronald L. Rivest, David A. Wagner 0001 |
Tweakable Block Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2002, 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002, Proceedings, pp. 31-46, 2002, Springer, 3-540-44050-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
tweakable block ciphers, initialization vector, block ciphers, modes of operation |
20 | Ray Bird, Inder S. Gopal, Amir Herzberg, Philippe A. Janson, Shay Kutten, Refik Molva, Moti Yung |
Systematic Design of Two-Party Authentication Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '91, 11th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings, pp. 44-61, 1991, Springer, 3-540-55188-3. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
16 | Martin R. Albrecht, Kenneth G. Paterson, Gaven J. Watson |
Plaintext Recovery Attacks against SSH. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SP ![In: 30th IEEE Symposium on Security and Privacy (SP 2009), 17-20 May 2009, Oakland, California, USA, pp. 16-26, 2009, IEEE Computer Society, 978-0-7695-3633-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
16 | ZhenYu Hu, Dongdai Lin, Wenling Wu, Dengguo Feng |
Constructing parallel long-message signcryption scheme from trapdoor permutation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Ser. F Inf. Sci. ![In: Sci. China Ser. F Inf. Sci. 50(1), pp. 82-98, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
parallel, signcryption, authenticated encryption, trapdoor permutations |
16 | Bin B. Zhu, Shipeng Li 0001, Yang Yang |
JPEG 2000 encryption enabling fine granularity scalability without decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS (6) ![In: International Symposium on Circuits and Systems (ISCAS 2005), 23-26 May 2005, Kobe, Japan, pp. 6304-6307, 2005, IEEE, 0-7803-8834-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Phillip Rogaway |
Nonce-Based Symmetric Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 11th International Workshop, FSE 2004, Delhi, India, February 5-7, 2004, Revised Papers, pp. 348-359, 2004, Springer, 3-540-22171-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Initialization vector, provable security, modes of operation, symmetric encryption, nonces |
16 | Stefan Mangard, Manfred Josef Aigner, Sandra Dominikus |
A Highly Regular and Scalable AES Hardware Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 52(4), pp. 483-491, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
IP module, scalability, VLSI, Advanced Encryption Standard (AES), regularity, hardware architecture |
16 | Brice Canvel, Alain P. Hiltgen, Serge Vaudenay, Martin Vuagnoux |
Password Interception in a SSL/TLS Channel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings, pp. 583-599, 2003, Springer, 3-540-40674-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
16 | Serge Vaudenay |
Security Flaws Induced by CBC Padding - Applications to SSL, IPSEC, WTLS .... ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings, pp. 534-546, 2002, Springer, 3-540-43553-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
16 | Hugo Krawczyk |
The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings, pp. 310-331, 2001, Springer, 3-540-42456-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
16 | Herbert Leitold, Wolfgang Mayerwieser, Udo Payer, Karl C. Posch, Reinhard Posch, Johannes Wolkerstorfer |
A 155 Mbps Triple-DES Network Encryptor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings, pp. 164-174, 2000, Springer, 3-540-41455-X. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
DES algorithm, cipher block chaining, true single-phase logic, full-custom design, Network security, pipelining, encryption, Triple-DES |
16 | Davor Runje, Mario Kovac |
Universal Strong Encryption FPGA Core Implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DATE ![In: 1998 Design, Automation and Test in Europe (DATE '98), February 23-26, 1998, Le Palais des Congrès de Paris, Paris, France, pp. 923-924, 1998, IEEE Computer Society, 0-8186-8359-7. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Chip Architecture, FPGA, Encryption, IDEA |
16 | Mitsuru Matsui |
New Block Encryption Algorithm MISTY. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 4th International Workshop, FSE '97, Haifa, Israel, January 20-22, 1997, Proceedings, pp. 54-68, 1997, Springer, 3-540-63247-6. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
16 | Ivan Damgård, Lars R. Knudsen |
The Breaking of the AR Hash Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings, pp. 286-292, 1993, Springer, 3-540-57600-2. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #53 of 53 (100 per page; Change: )
|
|