Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
173 | Burton S. Kaliski Jr., Yiqun Lisa Yin |
On Differential and Linear Crytoanalysis of the RC5 Encryption Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '95, 15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings, pp. 171-184, 1995, Springer, 3-540-60221-6. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
119 | Atsuko Miyaji, Masao Nonaka, Yoshinori Takii |
Known Plaintext Correlation Attack against RC5. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2002, The Cryptographer's Track at the RSA Conference, 2002, San Jose, CA, USA, February 18-22, 2002, Proceedings, pp. 131-148, 2002, Springer, 3-540-43224-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
119 | Johan Borst, Bart Preneel, Joos Vandewalle |
Linear Cryptanalysis of RC5 and RC6. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 6th International Workshop, FSE '99, Rome, Italy, March 24-26, 1999, Proceedings, pp. 16-30, 1999, Springer, 3-540-66226-X. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
119 | Lars R. Knudsen, Willi Meier |
Improved Differential Attacks on RC5. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '96, 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings, pp. 216-228, 1996, Springer, 3-540-61512-1. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Block Cipher, Differential cryptanalysis, Weak keys |
112 | Robert W. Baldwin, Ronald L. Rivest |
The RC5, RC5-CBC, RC5-CBC-Pad, and RC5-CTS Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 2040, pp. 1-29, October 1996. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
100 | Ali Aydin Selçuk |
New Results in Linear Cryptanalysis of RC5. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 5th International Workshop, FSE '98, Paris, France, March 23-25, 1998, Proceedings, pp. 1-16, 1998, Springer, 3-540-64265-X. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
82 | Helena Handschuh, Howard M. Heys |
A Timing Attack on RC5. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography '98, SAC'98, Kingston, Ontario, Canada, August 17-18, 1998, Proceedings, pp. 306-318, 1998, Springer, 3-540-65894-7. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Block Cipher, Timing Attacks |
82 | Alex Biryukov, Eyal Kushilevitz |
Improved Cryptanalysis of RC5. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998, Proceeding, pp. 85-99, 1998, Springer, 3-540-64518-7. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
RGS, Block ciphers, differential cryptanalysis |
68 | Alex Biryukov, Eyal Kushilevitz |
From Differential Cryptanalysis to Ciphertext-Only Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings, pp. 72-88, 1998, Springer, 3-540-64892-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Madryga, RC5, ciphertext-only attack, differential-linear attack, block-ciphers, DES, differential cryptanalysis |
67 | Takashi Matsunaka, Atsuko Miyaji, Yuuki Takano |
Success Probability in Chi2-Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings, pp. 310-325, 2004, Springer, 3-540-22217-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
RC5-64, 2 attack, statistical analysis, RC6 |
54 | Jing Deng 0002, Richard Han 0001, Shivakant Mishra |
A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPSN ![In: Information Processing in Sensor Networks, Second International Workshop, IPSN 2003, Palo Alto, CA, USA, April 22-23, 2003, Proceedings, pp. 349-364, 2003, Springer, 3-540-02111-6. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
54 | Michael May 0003 |
Locust - A Brokerage System for Accessing Idle Ressources for Web-Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROMICRO ![In: 25th EUROMICRO '99 Conference, Informatics: Theory and Practice for the New Millenium, 8-10 September 1999, Milan, Italy, pp. 2466-2475, 1999, IEEE Computer Society, 0-7695-0321-7. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
50 | Jorge Nakahara Jr., Daniel Santana de Freitas |
Cryptanalysis of Ake98. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2004, 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings, pp. 206-217, 2004, Springer, 3-540-24130-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Akelarre, Ake98, RC5, cryptanalysis, AES, IDEA, RC6 |
46 | Guerric Meurice de Dormale, John Bass, Jean-Jacques Quisquater |
Solving RC5 Challenges with Hardware -- a Distributed.net Perspective --. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPL ![In: FPL 2007, International Conference on Field Programmable Logic and Applications, Amsterdam, The Netherlands, 27-29 August 2007, pp. 642-647, 2007, IEEE, 1-4244-1060-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
46 | Guerric Meurice de Dormale, John Bass, Jean-Jacques Quisquater |
On Solving RC5 Challenges with FPGAs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCCM ![In: IEEE Symposium on Field-Programmable Custom Computing Machines, FCCM 2007, 23-25 April 2007, Napa, California, USA, pp. 281-282, 2007, IEEE Computer Society, 0-7695-2940-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Xiaohua Luo, Kougen Zheng, Yunhe Pan, Zhaohui Wu 0001 |
Encryption algorithms comparisons for wireless networked sensors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SMC (2) ![In: Proceedings of the IEEE International Conference on Systems, Man & Cybernetics: The Hague, Netherlands, 10-13 October 2004, pp. 1142-1146, 2004, IEEE, 0-7803-8566-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
36 | Prasanth Ganesan, Alexander G. Dean |
Enhancing the AvrX Kernel with Efficient Secure Communication Using Software Thread Integration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Real-Time and Embedded Technology and Applications Symposium ![In: 10th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS 2004), 25-28 May 2004, Toronto, Canada, pp. 265-275, 2004, IEEE Computer Society, 0-7695-2148-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
36 | Prasanth Ganesan, Ramnath Venugopalan, Pushkin Peddabachagari, Alexander G. Dean, Frank Mueller 0001, Mihail L. Sichitiu |
Analyzing and modeling encryption overhead for sensor network nodes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wireless Sensor Networks and Applications ![In: Proceedings of the Second ACM International Conference on Wireless Sensor Networks and Applications, WSNA 2003, San Diego, CA, USA, September 19, 2003, pp. 151-159, 2003, ACM, 1-58113-764-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
encryption overhead, model, sensor networks, embedded systems, analysis |
36 | Ramnath Venugopalan, Prasanth Ganesan, Pushkin Peddabachagari, Alexander G. Dean, Frank Mueller 0001, Mihail L. Sichitiu |
Encryption overhead in embedded systems and sensor network nodes: modeling and analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CASES ![In: Proceedings of the International Conference on Compilers, Architectures and Synthesis for Embedded Systems, CASES 2003, San Jose, California, USA, October 30 - November 1, 2003, pp. 188-197, 2003, ACM, 1-58113-676-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
security, sensor networks, embedded systems, encryption |
28 | Debranjan Pal, Upasana Mandal, Abhijit Das 0004, Dipanwita Roy Chowdhury |
Deep Learning based Differential Classifier of PRIDE and RC5. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 461, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
28 | Abeer Salim Jamil, Abdul Monem S. Rahma |
Image Encryption Based on Multi-Level Keys on RC5 Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Interact. Mob. Technol. ![In: Int. J. Interact. Mob. Technol. 16(17), pp. 101-115, September 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
28 | Yahya Arzani Birgani, Somayeh Timarchi, Ayesha Khalid |
Ultra-lightweight FPGA-based RC5 designs via data-dependent rotation block optimization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Microprocess. Microsystems ![In: Microprocess. Microsystems 93, pp. 104588, September 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
28 | Debranjan Pal, Upasana Mandal, Abhijit Das 0004, Dipanwita Roy Chowdhury |
Deep Learning Based Differential Classifier of PRIDE and RC5. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATIS ![In: Applications and Techniques in Information Security - 13th International Conference, ATIS 2022, Manipal, India, December 30-31, 2022, Revised Selected Papers, pp. 46-58, 2022, Springer, 978-981-99-2263-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
28 | Romana Shahzadi, Syed Muhammad Anwar, Farhan Qamar, Mudassar Ali, Joel J. P. C. Rodrigues |
Chaos Based Enhanced RC5 Algorithm for Security and Integrity of Clinical Images in Remote Health Monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 7, pp. 52858-52870, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Jayvee Christopher N. Vibar, Ariel M. Sison, Ruji P. Medina |
Implementation and Performance Assessment of Enhanced RC5 Cryptosystem Applied to Different File Types. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSET ![In: 9th IEEE International Conference on System Engineering and Technology, ICSET 2019, Shah Alam, Malaysia, October 7, 2019, pp. 201-204, 2019, IEEE, 978-1-7281-0758-5. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Jayvee Christopher N. Vibar, Ruji P. Medina, Ariel M. Sison |
ERC5a - An Enhanced RC5 Algorithm on Bit Propagation in the Encryption Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCS ![In: IEEE 4th International Conference on Computer and Communication Systems, ICCCS 2019, Singapore, February 23-25, 2019, pp. 479-482, 2019, IEEE, 978-1-7281-1322-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | A. Ruhan Bevi, S. Malarvizhi, Shubhra Saxena |
RC5 implementation in ARM platform for cryptographic applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Commun. Technol. ![In: Int. J. Inf. Commun. Technol. 6(3/4), pp. 251-259, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Abdul Hamid M. Ragab, Osama S. Farag Alla, Amin Y. Noaman |
Encryption Quality Analysis of the RCBC Block Cipher Compared with RC6 and RC5 Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2014, pp. 169, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
28 | A. Ruhan Bevi, S. S. V. Sheshu, S. Malarvizhi |
FPGA based sliding window architecture for RC5 encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICACCI ![In: 2012 International Conference on Advances in Computing, Communications and Informatics, ICACCI '12, Chennai, India, August 3-5, 2012, pp. 614-618, 2012, ACM, 978-1-4503-1196-0. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
28 | A. Ruhan Bevi, S. S. V. Sheshu, S. Malarvizhi |
FPGA based pipelined architecture for RC5 encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DICTAP ![In: 2012 Second International Conference on Digital Information and Communication Technology and it's Applications (DICTAP), Bangkok, Thailand, May 16-18, 2012, pp. 214-219, 2012, IEEE, 978-1-4673-0733-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Helena Handschuh |
RC5. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Cryptography and Security (2nd Ed.) ![In: Encyclopedia of Cryptography and Security, 2nd Ed., pp. 1032-1033, 2011, Springer, 978-1-4419-5905-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Mohamed Amin, Ahmed A. Abd El-Latif 0001 |
Efficient modified RC5 based on chaos adapted to image encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Electronic Imaging ![In: J. Electronic Imaging 19(1), pp. 013012, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
28 | Omar S. Elkeelany, Adegoke Olabisi |
Performance Comparisons, Design, and Implementation of RC5 Symmetric Encryption Core using Reconfigurable Hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. ![In: J. Comput. 3(3), pp. 48-55, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Mowafak Hasan, Hasan Al-Shalabi |
Modified Cryptanalysis of RC5. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. Arab J. Inf. Technol. ![In: Int. Arab J. Inf. Technol. 3(4), pp. 299-302, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
28 | Dirk Koch, Matthiaas Koerber, Jürgen Teich |
Searching RC5-Keys with Distributed Reconfigurable Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ERSA ![In: Proceedings of the 2006 International Conference on Engineering of Reconfigurable Systems & Algorithms, ERSA 2006, Las Vegas, Nevada, USA, June 26-29, 2006, pp. 42-48, 2006, CSREA Press, 1-60132-011-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
28 | Helena Handschuh |
RC5. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Cryptography and Security ![In: Encyclopedia of Cryptography and Security, 2005, Springer, 978-0-387-23473-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
28 | John P. Morrison, Padraig J. O'Dowd, Philip D. Healy |
Searching RC5 Keyspaces with Distributed Reconfigurable Hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Engineering of Reconfigurable Systems and Algorithms ![In: Proceedings of the International Conference on Engineering of Reconfigurable Systems and Algorithms, June 23 - 26, 2003, Las Vegas, Nevada, USA, pp. 269-272, 2003, CSREA Press. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
28 | Nicolas Sklavos 0001, Chris Machas, Odysseas G. Koufopavlou |
Area optimized architecture and VLSI implementation of RC5 encryption algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICECS ![In: Proceedings of the 2003 10th IEEE International Conference on Electronics, Circuits and Systems, ICECS 2003, Sharjah, United Arab Emirates, December 14-17, 2003, pp. 172-175, 2003, IEEE, 0-7803-8163-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Guido Bertoni, Luca Breveglieri, Israel Koren, Paolo Maistri, Vincenzo Piuri |
Concurrent Fault Detection in a Hardware Implementation of the RC5 Encryption Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASAP ![In: 14th IEEE International Conference on Application-Specific Systems, Architectures, and Processors (ASAP 2003), 24-26 June 2003, The Hague, The Netherlands, pp. 423-432, 2003, IEEE Computer Society, 0-7695-1992-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Atsuko Miyaji, Masao Nonaka, Yoshinori Takii |
Improved Correlation Attack on RC5. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85-A(1), pp. 44-57, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
28 | Pavel Gladyshev, Ahmed Patel, Donal O'Mahony |
Cracking RC5 with Java applets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Concurr. Pract. Exp. ![In: Concurr. Pract. Exp. 10(11-13), pp. 1165-1171, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
28 | Lars R. Knudsen, Willi Meier |
Differential cryptanalysis of RC5. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Eur. Trans. Telecommun. ![In: Eur. Trans. Telecommun. 8(5), pp. 445-454, 1997. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
28 | Ronald L. Rivest |
The RC5 Encryption Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption: Second International Workshop. Leuven, Belgium, 14-16 December 1994, Proceedings, pp. 86-96, 1994, Springer. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
18 | Jean-Philippe Aumasson, Orr Dunkelman, Sebastiaan Indesteege, Bart Preneel |
Cryptanalysis of Dynamic SHA(2). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 16th Annual International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers, pp. 415-432, 2009, Springer, 978-3-642-05443-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Dynamic SHA, Dynamic SHA2, hash function, collision attack, SHA-3 candidate |
18 | Niklas Therning, Lars Bengtsson |
Jalapeno: secentralized grid computing using peer-to-peer technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Conf. Computing Frontiers ![In: Proceedings of the Second Conference on Computing Frontiers, 2005, Ischia, Italy, May 4-6, 2005, pp. 59-65, 2005, ACM, 1-59593-019-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
GRID, distributed computing, P2P |
18 | David Molnar, Matt Piotrowski, David Schultz, David A. Wagner 0001 |
The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers, pp. 156-168, 2005, Springer, 3-540-33354-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Luca Breveglieri, Israel Koren, Paolo Maistri |
Detecting Faults in Four Symmetric Key Block Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASAP ![In: 15th IEEE International Conference on Application-Specific Systems, Architectures, and Processors (ASAP 2004), 27-29 September 2004, Galveston, TX, USA, pp. 258-268, 2004, IEEE Computer Society, 0-7695-2226-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
18 | Atul Maheshwari, Israel Koren, Wayne P. Burleson |
Techniques for Transient Fault Sensitivity Analysis and Reduction in VLSI Circuits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DFT ![In: 18th IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT 2003), 3-5 November 2003, Boston, MA, USA, Proceedings, pp. 597-, 2003, IEEE Computer Society, 0-7695-2042-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
18 | S. Jantarang, Panan Potipantong, Apisak Worapishet |
A low cost real-time intelligent taximeter sensor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APCCAS (1) ![In: IEEE Asia Pacific Conference on Circuits and Systems 2002, APCCAS 2002, Singapore, 16-18 December 2002, pp. 217-220, 2002, IEEE, 0-7803-7690-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
18 | Ali Aydin Selçuk |
On Bias Estimation in Linear Cryptanalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2000, First International Conference in Cryptology in India, Calcutta, India, December 10-13, 2000, Proceedings, pp. 52-66, 2000, Springer, 3-540-41452-5. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
18 | William E. Freeman, Ethan L. Miller |
An Experimental Analysis of Cryptographic Overhead in Performance-Critical Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MASCOTS ![In: MASCOTS 1999, Proceedings of the 7th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, 24-28 October, 1999, College Park, Maryland, USA, pp. 348-357, 1999, IEEE Computer Society, 0-7695-0381-0. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
18 | John Kelsey, Bruce Schneier, David A. Wagner 0001 |
Mod n Cryptanalysis, with Applications Against RC5P and M6. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 6th International Workshop, FSE '99, Rome, Italy, March 24-26, 1999, Proceedings, pp. 139-155, 1999, Springer, 3-540-66226-X. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
18 | Scott Contini, Ronald L. Rivest, Matthew J. B. Robshaw, Yiqun Lisa Yin |
Improved Analysis of Some Simplified Variants of RC6. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 6th International Workshop, FSE '99, Rome, Italy, March 24-26, 1999, Proceedings, pp. 1-15, 1999, Springer, 3-540-66226-X. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
18 | Helena Handschuh, Pascal Paillier, Jacques Stern |
Probing Attacks on Tamper-Resistant Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems, First International Workshop, CHES'99, Worcester, MA, USA, August 12-13, 1999, Proceedings, pp. 303-315, 1999, Springer, 3-540-66646-X. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
18 | John Kelsey, Bruce Schneier, David A. Wagner 0001, Chris Hall |
Side Channel Cryptanalysis of Product Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 98, 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings, pp. 97-110, 1998, Springer, 3-540-65004-0. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
product ciphers, cryptanalysis, timing attacks, side channels |
18 | Bruce Schneier, Doug Whiting |
Fast Software Encryption: Designing Encryption Algorithms for Optimal Software Speed on the Intel Pentium Processor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 4th International Workshop, FSE '97, Haifa, Israel, January 20-22, 1997, Proceedings, pp. 242-259, 1997, Springer, 3-540-63247-6. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|