The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for RC5 with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1994-1999 (18) 2000-2004 (16) 2005-2014 (15) 2019-2023 (7)
Publication types (Num. hits)
article(13) incollection(2) inproceedings(41)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 35 occurrences of 23 keywords

Results
Found 56 publication records. Showing 56 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
173Burton S. Kaliski Jr., Yiqun Lisa Yin On Differential and Linear Crytoanalysis of the RC5 Encryption Algorithm. Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
119Atsuko Miyaji, Masao Nonaka, Yoshinori Takii Known Plaintext Correlation Attack against RC5. Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
119Johan Borst, Bart Preneel, Joos Vandewalle Linear Cryptanalysis of RC5 and RC6. Search on Bibsonomy FSE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
119Lars R. Knudsen, Willi Meier Improved Differential Attacks on RC5. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Cryptanalysis, Block Cipher, Differential cryptanalysis, Weak keys
112Robert W. Baldwin, Ronald L. Rivest The RC5, RC5-CBC, RC5-CBC-Pad, and RC5-CTS Algorithms. Search on Bibsonomy RFC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
100Ali Aydin Selçuk New Results in Linear Cryptanalysis of RC5. Search on Bibsonomy FSE The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
82Helena Handschuh, Howard M. Heys A Timing Attack on RC5. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Cryptanalysis, Block Cipher, Timing Attacks
82Alex Biryukov, Eyal Kushilevitz Improved Cryptanalysis of RC5. Search on Bibsonomy EUROCRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF RGS, Block ciphers, differential cryptanalysis
68Alex Biryukov, Eyal Kushilevitz From Differential Cryptanalysis to Ciphertext-Only Attacks. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Madryga, RC5, ciphertext-only attack, differential-linear attack, block-ciphers, DES, differential cryptanalysis
67Takashi Matsunaka, Atsuko Miyaji, Yuuki Takano Success Probability in Chi2-Attacks. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF RC5-64, 2 attack, statistical analysis, RC6
54Jing Deng 0002, Richard Han 0001, Shivakant Mishra A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks. Search on Bibsonomy IPSN The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
54Michael May 0003 Locust - A Brokerage System for Accessing Idle Ressources for Web-Computing. Search on Bibsonomy EUROMICRO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
50Jorge Nakahara Jr., Daniel Santana de Freitas Cryptanalysis of Ake98. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Akelarre, Ake98, RC5, cryptanalysis, AES, IDEA, RC6
46Guerric Meurice de Dormale, John Bass, Jean-Jacques Quisquater Solving RC5 Challenges with Hardware -- a Distributed.net Perspective --. Search on Bibsonomy FPL The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
46Guerric Meurice de Dormale, John Bass, Jean-Jacques Quisquater On Solving RC5 Challenges with FPGAs. Search on Bibsonomy FCCM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
36Xiaohua Luo, Kougen Zheng, Yunhe Pan, Zhaohui Wu 0001 Encryption algorithms comparisons for wireless networked sensors. Search on Bibsonomy SMC (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
36Prasanth Ganesan, Alexander G. Dean Enhancing the AvrX Kernel with Efficient Secure Communication Using Software Thread Integration. Search on Bibsonomy IEEE Real-Time and Embedded Technology and Applications Symposium The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
36Prasanth Ganesan, Ramnath Venugopalan, Pushkin Peddabachagari, Alexander G. Dean, Frank Mueller 0001, Mihail L. Sichitiu Analyzing and modeling encryption overhead for sensor network nodes. Search on Bibsonomy Wireless Sensor Networks and Applications The full citation details ... 2003 DBLP  DOI  BibTeX  RDF encryption overhead, model, sensor networks, embedded systems, analysis
36Ramnath Venugopalan, Prasanth Ganesan, Pushkin Peddabachagari, Alexander G. Dean, Frank Mueller 0001, Mihail L. Sichitiu Encryption overhead in embedded systems and sensor network nodes: modeling and analysis. Search on Bibsonomy CASES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF security, sensor networks, embedded systems, encryption
28Debranjan Pal, Upasana Mandal, Abhijit Das 0004, Dipanwita Roy Chowdhury Deep Learning based Differential Classifier of PRIDE and RC5. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
28Abeer Salim Jamil, Abdul Monem S. Rahma Image Encryption Based on Multi-Level Keys on RC5 Algorithm. Search on Bibsonomy Int. J. Interact. Mob. Technol. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Yahya Arzani Birgani, Somayeh Timarchi, Ayesha Khalid Ultra-lightweight FPGA-based RC5 designs via data-dependent rotation block optimization. Search on Bibsonomy Microprocess. Microsystems The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Debranjan Pal, Upasana Mandal, Abhijit Das 0004, Dipanwita Roy Chowdhury Deep Learning Based Differential Classifier of PRIDE and RC5. Search on Bibsonomy ATIS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Romana Shahzadi, Syed Muhammad Anwar, Farhan Qamar, Mudassar Ali, Joel J. P. C. Rodrigues Chaos Based Enhanced RC5 Algorithm for Security and Integrity of Clinical Images in Remote Health Monitoring. Search on Bibsonomy IEEE Access The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Jayvee Christopher N. Vibar, Ariel M. Sison, Ruji P. Medina Implementation and Performance Assessment of Enhanced RC5 Cryptosystem Applied to Different File Types. Search on Bibsonomy ICSET The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Jayvee Christopher N. Vibar, Ruji P. Medina, Ariel M. Sison ERC5a - An Enhanced RC5 Algorithm on Bit Propagation in the Encryption Function. Search on Bibsonomy ICCCS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28A. Ruhan Bevi, S. Malarvizhi, Shubhra Saxena RC5 implementation in ARM platform for cryptographic applications. Search on Bibsonomy Int. J. Inf. Commun. Technol. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Abdul Hamid M. Ragab, Osama S. Farag Alla, Amin Y. Noaman Encryption Quality Analysis of the RCBC Block Cipher Compared with RC6 and RC5 Algorithms. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2014 DBLP  BibTeX  RDF
28A. Ruhan Bevi, S. S. V. Sheshu, S. Malarvizhi FPGA based sliding window architecture for RC5 encryption. Search on Bibsonomy ICACCI The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28A. Ruhan Bevi, S. S. V. Sheshu, S. Malarvizhi FPGA based pipelined architecture for RC5 encryption. Search on Bibsonomy DICTAP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Helena Handschuh RC5. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Mohamed Amin, Ahmed A. Abd El-Latif 0001 Efficient modified RC5 based on chaos adapted to image encryption. Search on Bibsonomy J. Electronic Imaging The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
28Omar S. Elkeelany, Adegoke Olabisi Performance Comparisons, Design, and Implementation of RC5 Symmetric Encryption Core using Reconfigurable Hardware. Search on Bibsonomy J. Comput. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Mowafak Hasan, Hasan Al-Shalabi Modified Cryptanalysis of RC5. Search on Bibsonomy Int. Arab J. Inf. Technol. The full citation details ... 2006 DBLP  BibTeX  RDF
28Dirk Koch, Matthiaas Koerber, Jürgen Teich Searching RC5-Keys with Distributed Reconfigurable Computing. Search on Bibsonomy ERSA The full citation details ... 2006 DBLP  BibTeX  RDF
28Helena Handschuh RC5. Search on Bibsonomy Encyclopedia of Cryptography and Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28John P. Morrison, Padraig J. O'Dowd, Philip D. Healy Searching RC5 Keyspaces with Distributed Reconfigurable Hardware. Search on Bibsonomy Engineering of Reconfigurable Systems and Algorithms The full citation details ... 2003 DBLP  BibTeX  RDF
28Nicolas Sklavos 0001, Chris Machas, Odysseas G. Koufopavlou Area optimized architecture and VLSI implementation of RC5 encryption algorithm. Search on Bibsonomy ICECS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
28Guido Bertoni, Luca Breveglieri, Israel Koren, Paolo Maistri, Vincenzo Piuri Concurrent Fault Detection in a Hardware Implementation of the RC5 Encryption Algorithm. Search on Bibsonomy ASAP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
28Atsuko Miyaji, Masao Nonaka, Yoshinori Takii Improved Correlation Attack on RC5. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2002 DBLP  BibTeX  RDF
28Pavel Gladyshev, Ahmed Patel, Donal O'Mahony Cracking RC5 with Java applets. Search on Bibsonomy Concurr. Pract. Exp. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
28Lars R. Knudsen, Willi Meier Differential cryptanalysis of RC5. Search on Bibsonomy Eur. Trans. Telecommun. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
28Ronald L. Rivest The RC5 Encryption Algorithm. Search on Bibsonomy FSE The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
18Jean-Philippe Aumasson, Orr Dunkelman, Sebastiaan Indesteege, Bart Preneel Cryptanalysis of Dynamic SHA(2). Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Dynamic SHA, Dynamic SHA2, hash function, collision attack, SHA-3 candidate
18Niklas Therning, Lars Bengtsson Jalapeno: secentralized grid computing using peer-to-peer technology. Search on Bibsonomy Conf. Computing Frontiers The full citation details ... 2005 DBLP  DOI  BibTeX  RDF GRID, distributed computing, P2P
18David Molnar, Matt Piotrowski, David Schultz, David A. Wagner 0001 The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Luca Breveglieri, Israel Koren, Paolo Maistri Detecting Faults in Four Symmetric Key Block Ciphers. Search on Bibsonomy ASAP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Atul Maheshwari, Israel Koren, Wayne P. Burleson Techniques for Transient Fault Sensitivity Analysis and Reduction in VLSI Circuits. Search on Bibsonomy DFT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
18S. Jantarang, Panan Potipantong, Apisak Worapishet A low cost real-time intelligent taximeter sensor. Search on Bibsonomy APCCAS (1) The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
18Ali Aydin Selçuk On Bias Estimation in Linear Cryptanalysis. Search on Bibsonomy INDOCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
18William E. Freeman, Ethan L. Miller An Experimental Analysis of Cryptographic Overhead in Performance-Critical Systems. Search on Bibsonomy MASCOTS The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
18John Kelsey, Bruce Schneier, David A. Wagner 0001 Mod n Cryptanalysis, with Applications Against RC5P and M6. Search on Bibsonomy FSE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
18Scott Contini, Ronald L. Rivest, Matthew J. B. Robshaw, Yiqun Lisa Yin Improved Analysis of Some Simplified Variants of RC6. Search on Bibsonomy FSE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
18Helena Handschuh, Pascal Paillier, Jacques Stern Probing Attacks on Tamper-Resistant Devices. Search on Bibsonomy CHES The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
18John Kelsey, Bruce Schneier, David A. Wagner 0001, Chris Hall Side Channel Cryptanalysis of Product Ciphers. Search on Bibsonomy ESORICS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF product ciphers, cryptanalysis, timing attacks, side channels
18Bruce Schneier, Doug Whiting Fast Software Encryption: Designing Encryption Algorithms for Optimal Software Speed on the Intel Pentium Processor. Search on Bibsonomy FSE The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #56 of 56 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license