The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for RC6 with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1999-2002 (19) 2003-2005 (17) 2006-2012 (15) 2014-2022 (15) 2023-2024 (2)
Publication types (Num. hits)
article(20) incollection(2) inproceedings(46)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 46 occurrences of 31 keywords

Results
Found 68 publication records. Showing 68 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
159Norihisa Isogai, Takashi Matsunaka, Atsuko Miyaji Optimized Chi2-Attack against RC6. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF 2-attack, Cryptanalysis, Block Cipher, RC6
142Lars R. Knudsen, Willi Meier Correlations in RC6 with a Reduced Number of Rounds. Search on Bibsonomy FSE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Cryptanalysis, Block Cipher, Advanced Encryption Standard, RC6
131Atsuko Miyaji, Yuuki Takano On the Success Probability of chi2-attack on RC6. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
107Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee 0002 Provable Security for an RC6-like Structure and a MISTY-FO-like Structure Against Differential Cryptanalysis. Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF MISTY, Provable Security, Differential Cryptanalysis, Linear Cryptanalysis, RC6, Feistel Network
98Takashi Matsunaka, Atsuko Miyaji, Yuuki Takano Success Probability in Chi2-Attacks. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF RC5-64, 2 attack, statistical analysis, RC6
89Kerstin Lemke, Kai Schramm, Christof Paar DPA on n-Bit Sized Boolean and Arithmetic Operations and Its Application to IDEA, RC6, and the HMAC-Construction. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Boolean and arithmetic operations, HMAC-construction, DPA, IDEA, RC6
89Masahiko Takenaka, Takeshi Shimoyama, Takeshi Koshiba Theoretical Analysis of chi2 Attack on RC6. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF $chi^2$ attack, RC6, Transition Matrix
79Henri Gilbert, Helena Handschuh, Antoine Joux, Serge Vaudenay A Statistical Attack on RC6. Search on Bibsonomy FSE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
79Scott Contini, Ronald L. Rivest, Matthew J. B. Robshaw, Yiqun Lisa Yin Improved Analysis of Some Simplified Variants of RC6. Search on Bibsonomy FSE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
63Jorge Nakahara Jr., Daniel Santana de Freitas Cryptanalysis of Ake98. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Akelarre, Ake98, RC5, cryptanalysis, AES, IDEA, RC6
61May Itani, Hassan B. Diab Reconfigurable Computing for RC6 Cryptography. Search on Bibsonomy ICPS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
61Jean-Luc Beuchat FPGA Implementations of the RC6 Block Cipher. Search on Bibsonomy FPL The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
61Takeshi Shimoyama, Masahiko Takenaka, Takeshi Koshiba Multiple Linear Cryptanalysis of a Reduced Round RC6. Search on Bibsonomy FSE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
52Johann Großschädl, Stefan Tillich, Christian Rechberger, Michael Hofmann 0007, Marcel Medwed Energy evaluation of software implementations of block ciphers under memory constraints. Search on Bibsonomy DATE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF energy optimization, code size reduction, symmetric cipher, lightweight cryptography, memory footprint
44Atsuko Miyaji, Masao Nonaka Cryptanalysis of the Reduced-Round RC6. Search on Bibsonomy ICICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
44Yong-Cong Chen, Long-Wen Chang A secure and robust digital watermarking technique by the block cipher RC6 and secure hash algorithm. Search on Bibsonomy ICIP (2) The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
44Kaijie Wu 0001, Ramesh Karri Idle Cycles Based Concurrent Error Detection of RC6 Encryption. Search on Bibsonomy DFT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
44Tetsu Iwata, Kaoru Kurosawa On the Pseudorandomness of the AES Finalists - RC6 and Serpent. Search on Bibsonomy FSE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
44Johan Borst, Bart Preneel, Joos Vandewalle Linear Cryptanalysis of RC5 and RC6. Search on Bibsonomy FSE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
35Helger Lipmaa Fast Software Implementations of SC2000. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Block cipher design, large S-boxes, SC2000, fast implementation
35Pawel Chodowiec, Po Khuon, Kris Gaj Fast implementations of secret-key block ciphers using mixed inner- and outer-round pipelining. Search on Bibsonomy FPGA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF fast architectures, secret-key ciphers, pipelining, AES
26Feng-Hsiag Hsiao, Shou-Wen Chang Integrating RC6 Stream Cipher to a Chaotic Synchronization System. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
26Feng-Hsiag Hsiao, Po-Wei Chiu, Shou-Wen Chang Integrating RC6 Stream Cipher to A Chaotic Synchronization System. Search on Bibsonomy SmartCloud The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
26Wid Akeel Awadh, Ali Salah Hashim, Alaa Khalaf Hamoud Efficiently Secure Data Communications Based on CBC-RC6 and the Overflow Field of Timestamp Option in an IPv4 Packet. Search on Bibsonomy Informatica (Slovenia) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
26Afia Murad Ashraf, Wael M. Elmedany, Mhd Saeed Sharif Secure IoT Data Transmission at Physical Layer using RC6 Encryption Technique. Search on Bibsonomy FiCloud The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
26Risto Donev, Abeer Alsadoon, P. W. C. Prasad, Ahmed Dawoud, Sami Haddad, Ahmad Alrubaie A novel secure solution of using mixed reality in data transmission for bowel and jaw surgical telepresence: enhanced rivest cipher RC6 block cipher. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
26Veerappan Manikandan, Rengarajan Amirtharajan On dual encryption with RC6 and combined logistic tent map for grayscale and DICOM. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
26Osama S. Faragallah, Hala S. El-sayed, Ashraf Afifi, S. F. El-Zoghdy Small Details Gray Scale Image Encryption Using RC6 Block Cipher. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
26Osama S. Faragallah, Ashraf Afifi, Walid El Shafai, Hala S. El-sayed, Mohammed A. Alzain, Jehad F. Al-Amri, Fathi E. Abd El-Samie Efficiently Encrypting Color Images With Few Details Based on RC6 and Different Operation Modes for Cybersecurity Applications. Search on Bibsonomy IEEE Access The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
26Zahraa Faisal, Esraa H. Abdul Ameer Encryption Image by Using RC6 and Hybrid Chaotic Map. Search on Bibsonomy Webology The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
26Rommel Evan J. Paje, Ariel M. Sison, Ruji P. Medina Multidimensional key RC6 algorithm. Search on Bibsonomy ICCSP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
26Ahmed I. Sallam, El-Sayed M. El-Rabaie, Osama S. Faragallah CABAC-based selective encryption for HEVC using RC6 in different operation modes. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
26Ahmed I. Sallam, Osama S. Faragallah, El-Sayed M. El-Rabaie HEVC Selective Encryption Using RC6 Block Cipher Technique. Search on Bibsonomy IEEE Trans. Multim. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
26Hongguo Zhu, Xin Hai, Jiuchuan Lin Integral and Impossible Differential Cryptanalysis of RC6. Search on Bibsonomy ICCCS (3) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
26Catherine Bhel B. Aguila, Ariel M. Sison, Ruji P. Medina Enhanced RC6 permutation-diffusion operation for image encryption. Search on Bibsonomy DSIT The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
26Anqi Yin, Zibin Dai, Longmei Nan, Wei Li 0131 RC6 architecture-adaptive implementation for coarse-grained reconfiguration array. Search on Bibsonomy ASICON The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
26Nusrat Jahan Oishi, Arafin Mahamud, Asaduzzaman Short paper: enhancing Wi-Fi security using a hybrid algorithm of blowfish and RC6. Search on Bibsonomy NSysS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
26Abdul Hamid M. Ragab, Osama S. Farag Alla, Amin Y. Noaman Encryption Quality Analysis of the RCBC Block Cipher Compared with RC6 and RC5 Algorithms. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2014 DBLP  BibTeX  RDF
26Ibrahim F. Elashry, Osama S. Faragallah, Alaa M. Abbas, S. El-Rabaie 0001, Fathi E. Abd El-Samie A New Method for Encrypting Images with Few Details Using Rijndael and RC6 Block Ciphers in the Electronic Code Book Mode. Search on Bibsonomy Inf. Secur. J. A Glob. Perspect. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
26Helena Handschuh RC6. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
26Routo Terada, Eduardo T. Ueda A New Version of the RC6 Algorithm, Stronger against χ2 Cryptanalysis. Search on Bibsonomy AISC The full citation details ... 2009 DBLP  BibTeX  RDF
26Nawal A. El-Fishawy, Osama M. Abu Zaid Quality of Encryption Measurement of Bitmap Images with RC6, MRC6, and Rijndael Block Cipher Algorithms. Search on Bibsonomy Int. J. Netw. Secur. The full citation details ... 2007 DBLP  BibTeX  RDF
26Atsuko Miyaji, Yuuki Takano Evaluation of the Security of RC6 against the Chi2-Attack. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Osama Salah Faragallah, Hossam El-din Hussien Ahmed, Hamdy Mohamed Kalash Encryption Efficiency Analysis and Security Evaluation of RC6 Block Cipher for Digital Images. Search on Bibsonomy Afr. J. Inf. Commun. Technol. The full citation details ... 2007 DBLP  BibTeX  RDF
26Helena Handschuh RC6. Search on Bibsonomy Encyclopedia of Cryptography and Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Masahiko Takenaka, Takeshi Shimoyama, Takeshi Koshiba Theoretical Analysis of chi2 Attack on RC6. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2004 DBLP  BibTeX  RDF
26Atsuko Miyaji, Masao Nonaka Cryptanalysis of Reduced-Round RC6 without Whitening. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2003 DBLP  BibTeX  RDF
26Kaijie Wu 0001, Piyush Mishra, Ramesh Karri Concurrent error detection of fault-based side-channel cryptanalysis of 128-bit RC6 block cipher. Search on Bibsonomy Microelectron. J. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
26Masahiko Takenaka, Takeshi Shimoyama, Takeshi Koshiba Theoretical Analysis of "Correlations in RC6". Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2002 DBLP  BibTeX  RDF
26Gerda Erica Mang, Ioan Mang Analysis of Suitability for Pseudorandom BIST of the RC6 Cipher. Search on Bibsonomy IMSA The full citation details ... 2002 DBLP  BibTeX  RDF
26Wenling Wu, Dengguo Feng, Sihan Qing Power Analysis of RC6 and Serpent. Search on Bibsonomy SEC The full citation details ... 2000 DBLP  BibTeX  RDF
26Ronald L. Rivest, Matthew J. B. Robshaw, Yiqun Lisa Yin RC6 as the AES. Search on Bibsonomy AES Candidate Conference The full citation details ... 2000 DBLP  BibTeX  RDF
17Debra L. Cook, Moti Yung, Angelos D. Keromytis Elastic block ciphers: method, security and instantiations. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Elastic block ciphers, Variable-length block ciphers, Reduction proof, Security analysis, Key recovery attacks
17Jorge Nakahara Jr., Gautham Sekar, Daniel Santana de Freitas, Chang Chiann, Ramon Hugo de Souza, Bart Preneel A New Approach to chi2 Cryptanalysis of Block Ciphers. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF ? 2, square and linear cryptanalysis, Block ciphers
17Jiali Choy, Huihui Yap Impossible Boomerang Attack for Block Cipher Structures. Search on Bibsonomy IWSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Impossible Boomerang Attack, Impossible Boomerang Distinguishers, Block Ciphers
17Guy Gogniat, Tilman Wolf, Wayne P. Burleson, Jean-Philippe Diguet, Lilian Bossuet, Romain Vaslin Reconfigurable Hardware for High-Security/ High-Performance Embedded Systems: The SAFES Perspective. Search on Bibsonomy IEEE Trans. Very Large Scale Integr. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Christos Strydis, Di Zhu, Georgi Gaydadjiev Profiling of symmetric-encryption algorithms for a novel biomedical-implant architecture. Search on Bibsonomy Conf. Computing Frontiers The full citation details ... 2008 DBLP  DOI  BibTeX  RDF implantable devices, microarchitectural profiling, symmetric encryption, ultra-low power
17Eric Whitman Smith, David L. Dill Automatic Formal Verification of Block Cipher Implementations. Search on Bibsonomy FMCAD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Lee Pike, Mark Shields, John Matthews A verifying core for a cryptographic language compiler. Search on Bibsonomy ACL2 The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cryptography, certification, optimizing compiler, ACL2, high-assurance, certifying compiler, verifying compiler
17Jianjun Duan, Joe Hurd, Guodong Li, Scott Owens, Konrad Slind, Junxing Zhang Functional Correctness Proofs of Encryption Algorithms. Search on Bibsonomy LPAR The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Helger Lipmaa, Johan Wallén, Philippe Dumas 0001 On the Additive Differential Probability of Exclusive-Or. Search on Bibsonomy FSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Additive differential probability, differential cryptanalysis, rational series
17Olaf Neiße, Jürgen Pulkus Switching Blindings with a View Towards IDEA. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Jongsung Kim, Seokhie Hong, Jaechul Sung, Changhoon Lee, Sangjin Lee 0002 Impossible Differential Cryptanalysis for Block Cipher Structures. Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Jean-Sébastien Coron, Alexei Tchulkine A New Algorithm for Switching from Arithmetic to Boolean Masking. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Kazumaro Aoki, Tetsuya Ichikawa, Masayuki Kanda, Mitsuru Matsui, Shiho Moriai, Junko Nakajima, Toshio Tokita Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
17Andreas Dandalis, Viktor K. Prasanna, José D. P. Rolim A Comparative Study of Performance of AES Final Candidates Using FPGAs. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
17Lars R. Knudsen Advanced Encryption Standard (AES) - An Update. Search on Bibsonomy IMACC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
17R. Reed Taylor, Seth Copen Goldstein A High-Performance Flexible Architecture for Cryptography. Search on Bibsonomy CHES The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #68 of 68 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license