The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase HC-256 (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1956-1982 (15) 1984-1987 (17) 1988-1990 (29) 1991-1992 (18) 1993-1994 (20) 1995-1996 (30) 1997 (23) 1998 (20) 1999 (25) 2000 (28) 2001 (48) 2002 (45) 2003 (50) 2004 (71) 2005 (78) 2006 (93) 2007 (107) 2008 (117) 2009 (84) 2010 (43) 2011 (35) 2012 (32) 2013 (22) 2014 (24) 2015 (35) 2016 (31) 2017 (31) 2018 (43) 2019 (40) 2020 (36) 2021 (43) 2022 (46) 2023 (35) 2024 (8)
Publication types (Num. hits)
article(501) data(1) incollection(4) inproceedings(916)
Venues (Conferences, Journals, ...)
IACR Cryptol. ePrint Arch.(86) IEEE J. Solid State Circuits(61) FSE(53) ISCAS(34) Selected Areas in Cryptography(27) ISSCC(25) INDOCRYPT(19) ACISP(17) OFC(17) SC(16) CHI(15) EUROCRYPT(14) IPDPS(14) ASIACRYPT(13) FPL(13) CoRR(12) More (+10 of total 514)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 885 occurrences of 595 keywords

Results
Found 1422 publication records. Showing 1422 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
127Deukjo Hong, Donghoon Chang, Jaechul Sung, Sangjin Lee 0002, Seokhie Hong, Jaesang Lee 0002, Dukjae Moon, Sungtaek Chee A New Dedicated 256-Bit Hash Function: FORK-256. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF 256-bit Hash Function, FORK-256
121Pinakpani Pal, Palash Sarkar 0001 PARSHA-256- - A New Parallelizable Hash Function and a Multithreaded Implementation. Search on Bibsonomy FSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF parallel algorithm, hash function, binary tree, SHA-256
88Samuel Galice, Marine Minier Improving Integral Attacks Against Rijndael-256 Up to 9 Rounds. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF integral attacks, Rijndael-256, cryptanalysis, block cipher
81Florian Mendel, Joseph Lano, Bart Preneel Cryptanalysis of Reduced Variants of the FORK-256 Hash Function. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
73Gautham Sekar, Bart Preneel Improved Distinguishing Attacks on HC-256. Search on Bibsonomy IWSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
72Hirotaka Yoshida, Alex Biryukov Analysis of a SHA-256 Variant. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF SHA-2-XOR, SHACAL-2-XOR, Pseudo-collision resistance, Iterative patterns, Differential cryptanalysis, SHA-256
65Ivica Nikolic, Alex Biryukov Collisions for Step-Reduced SHA-256. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
63Hongbo Yu, Xiaoyun Wang 0001 Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF MAC, distinguishing attack, SHA-256
63Krystian Matusiewicz, Thomas Peyrin, Olivier Billet, Scott Contini, Josef Pieprzyk Cryptanalysis of FORK-256. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF FORK-256, micro-collisions, cryptanalysis, hash functions
63Markku-Juhani Olavi Saarinen A Meet-in-the-Middle Collision Attack Against the New FORK-256. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF FORK-256, Hash Function Cryptanalysis, Meet-in-the-middle Attack
57Somitra Kumar Sanadhya, Palash Sarkar 0001 Non-linear Reduced Round Attacks against SHA-2 Hash Family. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
57Alex Biryukov, Dmitry Khovratovich, Ivica Nikolic Distinguisher and Related-Key Attack on the Full AES-256. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF chosen key distinguisher, Davies-Meyer, ideal cipher, AES, related-key attack
57Jongsung Kim, Seokhie Hong, Bart Preneel Related-Key Rectangle Attacks on Reduced AES-192 and AES-256. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Cryptanalysis, Block Ciphers, AES, Related-Key Rectangle Attack
57Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen Analysis of Step-Reduced SHA-256. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
57Hongjun Wu A New Stream Cipher HC-256. Search on Bibsonomy FSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
55Marko Hölbl, Christian Rechberger, Tatjana Welzer Searching for Messages Conforming to Arbitrary Sets of Conditions in SHA-256. Search on Bibsonomy WEWoRC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF differential collision search, hash function, conditions, SHA-256
49Somitra Kumar Sanadhya, Palash Sarkar 0001 New Collision Attacks against Up to 24-Step SHA-2. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF SHA-2 hash family, reduced round attacks, Cryptanalysis
49Swatee Singh, Georgia D. Tourassi, Joseph Y. Lo Effect of Similarity Metrics and ROI Sizes in Featureless Computer Aided Detection of Breast Masses in Tomosynthesis. Search on Bibsonomy Digital Mammography / IWDM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF 3D CAD, mammography, x-ray, Computer Aided Detection, Tomosynthesis
48Yongzhuang Wei, YuPu Hu New related-key rectangle attacks on reduced AES-192 and AES-256. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF block cipher, Advanced Encryption Standard, time complexity, related-key rectangle attack
48Ewan Fleischmann, Michael Gorski, Stefan Lucks Attacking 9 and 10 Rounds of AES-256. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF related-key boomerang attack, block ciphers, AES, differential cryptanalysis
48Somitra Kumar Sanadhya, Palash Sarkar 0001 Attacking Reduced Round SHA-256. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
41Florian Mendel, Martin Schläffer Collisions for Round-Reduced LAKE. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cryptanalysis, hash functions, collision attack
40Matthew Henricksen, Ed Dawson Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Intel Pentium 4, Dragon, HC-256, MAG, Mir-1, Py, Implementation, Stream cipher, RC4
40Sebastiaan Indesteege, Florian Mendel, Bart Preneel, Martin Schläffer Practical Collisions for SHAMATA-256. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SHAMATA, hash function, collision attack, SHA-3 candidate
40Bonwook Koo, Hwan Seok Jang, Jung Hwan Song On Constructing of a 32 ×32 Binary Matrix as a Diffusion Layer for a 256-Bit Block Cipher. Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF diffusion layer, SPN, Block cipher, binary matrix
40Chih-Peng Fan, Mau-Shih Lee, Guo-An Su A Low Multiplier and Multiplication Costs 256-point FFT Implementation with Simplified Radix-24 SDF Architecture. Search on Bibsonomy APCCAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
40Kurt K. Ting, Steve C. L. Yuen, Kin-Hong Lee, Philip Heng Wai Leong An FPGA Based SHA-256 Processor. Search on Bibsonomy FPL The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
39Kazumaro Aoki, Jian Guo 0001, Krystian Matusiewicz, Yu Sasaki, Lei Wang 0031 Preimages for Step-Reduced SHA-2. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SHA-512, hash, preimage attack, meet-in-the-middle, SHA-256
39Takanori Isobe 0001, Kyoji Shibutani Preimage Attacks on Reduced Tiger and SHA-2. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SHA-512, hash function, preimage attack, second preimage attack, meet-in-the-middle, SHA-256, Tiger
39Fei Wu 0005, Liang Wang, Jiguang Wan A Low Cost and Inner-round Pipelined Design of ECB-AES-256 Crypto Engine for Solid State Disk. Search on Bibsonomy NAS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF inner-round, ECB-AES-256 crypto engine, SSD
39Yong Ki Lee, Herwin Chan, Ingrid Verbauwhede Iteration Bound Analysis and Throughput Optimum Architecture of SHA-256 (384, 512) for Hardware Implementations. Search on Bibsonomy WISA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF SHA-256 (384,512), Iteration Bound Analysis, Throughput Optimum Architecture
33Tsung-Han Tsai 0001, Yu-Nan Pan High Efficiency Architecture of Fast Block Motion Estimation with Real-Time QFHD on H.264 Video Coding. Search on Bibsonomy ISM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
33Akashi Satoh ASIC hardware implementations for 512-bit hash function Whirlpool. Search on Bibsonomy ISCAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
32Kitae Jeong, Joongeun Choi, Yuseop Lee, Changhoon Lee, Jaechul Sung, Haeryong Park, Yeonjung Kang Update on SEED: SEED-192/256. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Block Ciphers, SEED
32Mooseop Kim, Jaecheol Ryou 0001, Sungik Jun Efficient Hardware Architecture of SHA-256 Algorithm for Trusted Mobile Computing. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
32Joon Woo Shin, Hyeong Jun Park, Dae Soon Cho, Chang Wan Yoo, Yoon Ok Park, Deuk Soo Lyu The Implementation of 256 QAM CDMA Modulator. Search on Bibsonomy HSNMC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
32Peter-Michael Seidel, Lee D. McFearin, David W. Matula Binary Multiplication Radix-32 and Radix-256. Search on Bibsonomy IEEE Symposium on Computer Arithmetic The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
32Khadijeh Karamzadeh, Masood Teymouri, Massoud Dousti, Pooya Torkzadeh A 256 × 256 CMOS image sensor with differential readout and data converter circuits. Search on Bibsonomy Int. J. Circuit Theory Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
32Jier Wang, Jie Li, Yifan Wu, Hengwei Yu, Lebei Cui, Miao Sun, Patrick Yin Chiang A 256 × 256 LiDAR Imaging System Based on a 200 mW SPAD-Based SoC with Microlens Array and Lightweight RGB-Guided Depth Completion Neural Network. Search on Bibsonomy Sensors The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
32Hachem Bensalem, Yves Blaquière, Yvon Savaria Acceleration of the Secure Hash Algorithm-256 (SHA-256) on an FPGA-CPU Cluster Using OpenCL. Search on Bibsonomy ISCAS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
32Pekka Keränen, Juha Kostamovaara 256 × 8 SPAD Array With 256 Column TDCs for a Line Profiling Laser Radar. Search on Bibsonomy IEEE Trans. Circuits Syst. I Regul. Pap. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
32You-Na Lee 0001, Yasuyuki Kimura, Yusuke Nakamura, Toshihiko Noda, Kazuhiro Takahashi, Kazuaki Sawada Insertable 256×256 ion image sensor for spatiotemporal pH recording. Search on Bibsonomy BioCAS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
32Robert K. Henderson, Nick Johnston, Sam W. Hutchings, István Gyöngy, Tarek Al Abbas, Neale A. W. Dutton, Max Tyler, Susan Chan, Jonathan Leach A 256×256 40nm/90nm CMOS 3D-Stacked 120dB Dynamic-Range Reconfigurable Time-Resolved SPAD Imager. Search on Bibsonomy ISSCC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
32Li Lin 0003, Wenling Wu Improved meet-in-the-middle attacks on reduced-round Kalyna-128/256 and Kalyna-256/512. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
32Ben Lapid, Avishai Wool Cache-Attacks on the ARM TrustZone implementations of AES-256 and AES-256-GCM via GPU-based analysis. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2018 DBLP  BibTeX  RDF
32Ben Lapid, Avishai Wool Cache-Attacks on the ARM TrustZone Implementations of AES-256 and AES-256-GCM via GPU-Based Analysis. Search on Bibsonomy SAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
32Augusto Ronchini Ximenes, Preethi Padmanabhan, Myung-Jae Lee, Yuichiro Yamashita, Dun-Nian Yaung, Edoardo Charbon A 256×256 45/65nm 3D-stacked SPAD-based direct TOF image sensor for LiDAR applications with optical polar modulation for up to 18.6dB interference suppression. Search on Bibsonomy ISSCC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
32Zhe Chen, Shan Di, Zhongxiang Cao, Qi Qin, Fei Ji, Liyuan Liu, Nanjian Wu A 256×256 time-of-flight image sensor based on center-tap demodulation pixel structure. Search on Bibsonomy Sci. China Inf. Sci. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
32Hongbo Yu, Yonglin Hao, Dongxia Bai Evaluate the security margins of SHA-512, SHA-256 and DHA-256 against the boomerang attack. Search on Bibsonomy Sci. China Inf. Sci. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
32Li Lin 0003, Wenling Wu Improved Meet-in-the-Middle Attacks on Reduced-Round Kalyna-128/256 and Kalyna-256/512. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2016 DBLP  BibTeX  RDF
32Tony Hansen SCRAM-SHA-256 and SCRAM-SHA-256-PLUS Simple Authentication and Security Layer (SASL) Mechanisms. Search on Bibsonomy RFC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
32Akshima, Donghoon Chang, Mohona Ghosh, Aarushi Goel, Somitra Kumar Sanadhya Single Key Recovery Attacks on 9-round Kalyna-128/256 and Kalyna-256/512. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2015 DBLP  BibTeX  RDF
32Akshima, Donghoon Chang, Mohona Ghosh, Aarushi Goel, Somitra Kumar Sanadhya Single Key Recovery Attacks on 9-Round Kalyna-128/256 and Kalyna-256/512. Search on Bibsonomy ICISC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
32Fatma Kahri, Hassen Mestiri, Belgacem Bouallegue, Mohsen Machhout Efficient FPGA hardware implementation of secure hash function SHA-256/Blake-256. Search on Bibsonomy SSD The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
32Jinkeon Kang, Kitae Jeong, Jaechul Sung, Seokhie Hong, Kyungho Lee Collision Attacks on AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis. Search on Bibsonomy J. Appl. Math. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
32Ruoyu Xu, Bing Liu 0012, George Jie Yuan A 1500 fps Highly Sensitive 256 , ˟, 256 CMOS Imaging Sensor With In-Pixel Calibration. Search on Bibsonomy IEEE J. Solid State Circuits The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
32Yusuke Oike, Abbas El Gamal A 256×256 CMOS image sensor with ΔΣ-based single-shot compressed sensing. Search on Bibsonomy ISSCC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
32Shingo Mandai, Makoto Ikeda, Kunihiro Asada A 256×256 14k range maps/s 3-D range-finding image sensor using row-parallel embedded binary. Search on Bibsonomy ISSCC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
32Vahid Majidzadeh, Laurent Jacques, Alexandre Schmid, Pierre Vandergheynst, Yusuf Leblebici A (256×256) pixel 76.7mW CMOS imager/ compressor based on real-time In-pixel compressive sensing. Search on Bibsonomy ISCAS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
32Yaser Esmaeili Salehani, Amir Tabatabaei, Mohammad Reza Sohizadeh Abyaneh, Mehdi M. Hassanzadeh NESHA-256, NEw 256-bit Secure Hash Algorithm (Extended Abstract). Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2009 DBLP  BibTeX  RDF
32Ryan W. Robucci, Jordan D. Gray, David Abramson 0002, Paul E. Hasler A 256×256 separable transform CMOS imager. Search on Bibsonomy ISCAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
32Seiichiro Mizuno, Kazuki Fujita, Hiroo Yamamoto, Naohisa Mukozaka, Haruyoshi Toyoda A 256×256 compact CMOS image sensor with on-chip motion detection function. Search on Bibsonomy IEEE J. Solid State Circuits The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
32Yang Ni, Jianhong Guan A 256×256 pixel smart CMOS image sensor for line-based stereo vision applications. Search on Bibsonomy IEEE J. Solid State Circuits The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
32Iliana L. Fujimori, Ching-Chun Wang, Charles G. Sodini A 256×256 CMOS differential passive pixel imager with FPN reduction techniques. Search on Bibsonomy IEEE J. Solid State Circuits The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
32Steven Decker, R. Daniel McGrath, Kevin Brehmer, Charles G. Sodini A 256×256 CMOS imaging array with wide dynamic range pixels and column-parallel digital output. Search on Bibsonomy IEEE J. Solid State Circuits The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
32R. H. Nixon, Sabrina E. Kemeny, Bedabrata Pain, Craig O. Staller, Eric R. Fossum 256×256 CMOS active pixel sensor camera-on-a-chip. Search on Bibsonomy IEEE J. Solid State Circuits The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
32David L. Perry, Eustace L. Dereniak Laboratory evaluation of the Hughes 256 x 256 hybrid PtSi imaging device. Search on Bibsonomy J. Electronic Imaging The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
32Kyusun Choi, William S. Adams VLSI Implementation of a 256 x 256 Crossbar Interconnection Network. Search on Bibsonomy IPPS The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
32Hiroshi Miyanaga, Hironori Yamauchi, Kazuhiro Matsuda A real-time 256×256 point two-dimensional FFT single-chip processor. Search on Bibsonomy ICASSP The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
32J. L. Mitchell, Kenneth H. Olsen TX-0, a transistor computer with a 256 by 256 memory. Search on Bibsonomy AIEE-IRE Computer Conference (Eastern) The full citation details ... 1956 DBLP  DOI  BibTeX  RDF
31Ricardo Chaves, Georgi Kuzmanov, Leonel Sousa, Stamatis Vassiliadis Improving SHA-2 Hardware Implementations. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF SHA-2 (256, 512), FPGA, Cryptography, Hash functions
31Johnson Kin, Munish Gupta, William H. Mangione-Smith The Filter Cache: An Energy Efficient Memory Structure. Search on Bibsonomy MICRO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF direct mapped 256-byte filter cache, energy efficient memory structure, on-chip caches, static RAM, microprocessors, microprocessor chips, power reduction, embedded applications, L2 cache, filter cache, L1 cache
24John Paul Walters, Rohan Darole, Vipin Chaudhary Improving MPI-HMMER's scalability with parallel I/O. Search on Bibsonomy IPDPS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
24Chin-Teng Lin, Yuan-Chu Yu, Lan-Da Van Cost-Effective Triple-Mode Reconfigurable Pipeline FFT/IFFT/2-D DCT Processor. Search on Bibsonomy IEEE Trans. Very Large Scale Integr. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Jie Chen 0055, YuPu Hu, Yueyu Zhang Impossible differential cryptanalysis of Advanced Encryption Standard. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cryptanalysis, block cipher, advanced encryption standard, impossible differential cryptanalysis
24François Arnault, Thierry P. Berger, Cédric Lauradoux, Marine Minier X-FCSR - A New Software Oriented Stream Cipher Based Upon FCSRs. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cryptanalysis, stream cipher, software design, FCSRs
24Hirotaka Yoshida, Dai Watanabe, Katsuyuki Okeya, Jun Kitahara, Hongjun Wu 0001, Özgül Küçük, Bart Preneel MAME: A Compression Function with Reduced Hardware Requirements. Search on Bibsonomy CHES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF low-resource implementation, hash functions, compression functions
24Alice N. Averbukh, David S. Channin, Michael J. Flynn Assessment of a Novel, High-Resolution, Color, AMLCD for Diagnostic Medical Image Display: Luminance Performance and DICOM Calibration. Search on Bibsonomy J. Digit. Imaging The full citation details ... 2003 DBLP  DOI  BibTeX  RDF AMLCD evaluation, DICOM Part 14 calibration, PACS, image display
24Domingo Benitez Performance of Remote FPGA-Based Coprocessors for Image-Processing Applications. Search on Bibsonomy DSD The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
24Bert den Boer, Kerstin Lemke, Guntram Wicke A DPA Attack against the Modular Reduction within a CRT Implementation of RSA. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF RSA, DPA, power analysis, smartcard, CRT, side channel analysis, modular reduction
24Chin-Chen Chang 0001, Yuan-Yuan Su A Dynamic Color Palette for Color Images Coding. Search on Bibsonomy IEEE Pacific Rim Conference on Multimedia The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Index color, CIQBM, LBG
24Eun Seok Kim, Jay Jeong Kim An Automatic Modeling Method for Fitting Volumetric Objects with Metacubes. Search on Bibsonomy PG The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
24Eli Biham, Vladimir Furman Improved Impossible Differentials on Twofish. Search on Bibsonomy INDOCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Twofish, cryptanalysis, impossible differential
24John Kelsey, Bruce Schneier Key-Schedule Cryptanalysis of DEAL. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
24Kum-Yew Lai, Thomas W. Malone Object lens: letting end-users create cooperative work applications. Search on Bibsonomy CHI The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
24Kate Ehrlich Human interface at SUN (East). Search on Bibsonomy CHI The full citation details ... 1991 DBLP  DOI  BibTeX  RDF Sun
24Mark K. Singley MOLEHILL: an instructional system for Smalltalk programming. Search on Bibsonomy CHI The full citation details ... 1991 DBLP  DOI  BibTeX  RDF Smalltalk
24Brad T. Vander Zanden, Brad A. Myers The Lapidary graphical interface design tool. Search on Bibsonomy CHI The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
24Jamie Schultz A graphical reflection notation used in an intelligent discovery world tutoring system. Search on Bibsonomy CHI The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
24Lon Barfield, Eddy Boeve, Steven Pemberton The views user-interface system. Search on Bibsonomy CHI The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
24Allen Cypher Video presentation Eager: programming repetitive tasks by example. Search on Bibsonomy CHI The full citation details ... 1991 DBLP  DOI  BibTeX  RDF HyperCard
24Neff Walker, John B. Smelcer A comparison of selection time from walking and pull-down menus. Search on Bibsonomy CHI The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
24Terry Winograd What can we teach about human-computer interaction? (plenary address). Search on Bibsonomy CHI The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
24Hans Brunner A snapshot of natural language interfaces (panel). Search on Bibsonomy CHI The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
24Jakob Nielsen Designing for international use (panel). Search on Bibsonomy CHI The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
24S. Joy Mountford Designers: meet your users (panel). Search on Bibsonomy CHI The full citation details ... 1990 DBLP  DOI  BibTeX  RDF Apple Computer, HyperCard, Inc
24Marcy Telles Updating an older interface. Search on Bibsonomy CHI The full citation details ... 1990 DBLP  DOI  BibTeX  RDF WordStar
24James A. Reeds, John L. Manferdelli DES Has No Per Round Linear Factors. Search on Bibsonomy CRYPTO The full citation details ... 1984 DBLP  DOI  BibTeX  RDF
24Alex Biryukov, Dmitry Khovratovich Related-Key Cryptanalysis of the Full AES-192 and AES-256. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF AES, related-key attack, boomerang attack
24Paul Stankovski, Martin Hell, Thomas Johansson 0001 An Efficient State Recovery Attack on X-FCSR-256. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF X-FCSR, state recovery, cryptanalysis, stream cipher, FCSR
Displaying result #1 - #100 of 1422 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license