Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
102 | Baudoin Collard, François-Xavier Standaert, Jean-Jacques Quisquater |
Improved and Multiple Linear Cryptanalysis of Reduced Round Serpent. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers, pp. 51-65, 2007, Springer, 978-3-540-79498-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
multiple linear cryptanalysis, Advanced Encryption Standard, branch-and-bound, linear cryptanalysis, linear approximations, Serpent |
94 | Nicolas T. Courtois, Josef Pieprzyk |
Cryptanalysis of Block Ciphers with Overdefined Systems of Equations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings, pp. 267-287, 2002, Springer, 3-540-00171-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
MQ problem, overdefined systems of multivariate equations, Gröbner bases, sparse multivariate polynomials, Multivariate Cryptanalysis, Block ciphers, AES, Rijndael, Square, Camellia, Serpent, XL algorithm, multivariate quadratic equations |
93 | Orr Dunkelman, Sebastiaan Indesteege, Nathan Keller |
A Differential-Linear Attack on 12-Round Serpent. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2008, 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings, pp. 308-321, 2008, Springer, 978-3-540-89753-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
93 | Jesús Lázaro 0001, Armando Astarloa, Jagoba Arias, Unai Bidarte, Carlos Cuadrado |
High Throughput Serpent Encryption Implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPL ![In: Field Programmable Logic and Application, 14th International Conference , FPL 2004, Leuven, Belgium, August 30-September 1, 2004, Proceedings, pp. 996-1000, 2004, Springer, 3-540-22989-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
93 | Eli Biham, Orr Dunkelman, Nathan Keller |
Differential-Linear Cryptanalysis of Serpent. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 10th International Workshop, FSE 2003, Lund, Sweden, February 24-26, 2003, Revised Papers, pp. 9-21, 2003, Springer, 3-540-20449-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
93 | Eli Biham, Orr Dunkelman, Nathan Keller |
Linear Cryptanalysis of Reduced Round Serpent. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 8th International Workshop, FSE 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers, pp. 16-27, 2001, Springer, 3-540-43869-6. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
85 | Joo Yeon Cho, Miia Hermelin, Kaisa Nyberg |
A New Technique for Multidimensional Linear Cryptanalysis with Applications on Reduced Round Serpent. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2008, 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers, pp. 383-398, 2008, Springer, 978-3-642-00729-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Multidimensional Linear Approximation, Block Ciphers, Linear Cryptanalysis, Serpent |
76 | Adrian K. Lutz, Jürg Treichler, Frank K. Gürkaynak, Hubert Kaeslin, Gérard Basler, Antonia Erni, Stephan Reichmuth, Pieter Rommens, Stephan Oetiker, Wolfgang Fichtner |
2Gbit/s Hardware Realizations of RIJNDAEL and SERPENT: A Comparative Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers, pp. 144-158, 2002, Springer, 3-540-00409-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
76 | Eli Biham, Orr Dunkelman, Nathan Keller |
The Rectangle Attack - Rectangling the Serpent. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2001, International Conference on the Theory and Application of Cryptographic Techniques, Innsbruck, Austria, May 6-10, 2001, Proceeding, pp. 340-357, 2001, Springer, 3-540-42070-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
76 | Adam J. Elbirt, Christof Paar |
An FPGA implementation and performance evaluation of the Serpent block cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPGA ![In: Proceedings of the ACM/SIGDA International Symposium on Field Programmable Gate Arrays, FPGA 2000, Monterey, CA, USA, February 10-11, 2000, pp. 33-40, 2000, ACM, 1-58113-193-3. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
algorithm-agility, FPGA, cryptography, VHDL, block cipher |
60 | Alex Biryukov, Christophe De Cannière |
Block Ciphers and Systems of Quadratic Equations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 10th International Workshop, FSE 2003, Lund, Sweden, February 24-26, 2003, Revised Papers, pp. 274-289, 2003, Springer, 3-540-20449-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Khazad, Misty, Block ciphers, linearization, Rijndael, Camellia, Serpent, multivariate quadratic equations |
59 | John Kelsey, Tadayoshi Kohno, Bruce Schneier |
Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 7th International Workshop, FSE 2000, New York, NY, USA, April 10-12, 2000, Proceedings, pp. 75-93, 2000, Springer, 3-540-41728-1. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
59 | Cameron Patterson |
A Dynamic FPGA Implementation of the Serpent Block Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings, pp. 141-155, 2000, Springer, 3-540-41455-X. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
43 | Muhammad Reza Z'aba, Håvard Raddum, Matthew Henricksen, Ed Dawson |
Bit-Pattern Based Integral Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers, pp. 363-381, 2008, Springer, 978-3-540-71038-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
integral cryptanalysis, Noekeon, Block ciphers, present, Serpent |
43 | Nicolas T. Courtois, Blandine Debraize |
Specific S-Box Criteria in Algebraic Attacks on Block Ciphers with Several Known Plaintexts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WEWoRC ![In: Research in Cryptology, Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers, pp. 100-113, 2007, Springer, 978-3-540-88352-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
algebraic attacks on block ciphers, Gröbner bases, design of S-boxes, Rijndael, algebraic immunity, Serpent, multivariate equations |
43 | Nicolas T. Courtois |
General Principles of Algebraic Attacks and New Design Criteria for Cipher Components. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AES Conference ![In: Advanced Encryption Standard - AES, 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papers, pp. 67-83, 2004, Springer, 3-540-26557-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
polynomial relations, design of cryptographic primitives, generalised linear cryptanalysis, multivariate public key encryption and signature schemes, Quartz, combiners with memory, elimination methods, Gröbner bases, Boolean functions, stream ciphers, block ciphers, AES, finite fields, algebraic attacks, Rijndael, Serpent, HFE, Sflash, multivariate equations |
42 | Baudoin Collard, François-Xavier Standaert, Jean-Jacques Quisquater |
Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers, pp. 382-397, 2008, Springer, 978-3-540-71038-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
42 | Miia Hermelin, Joo Yeon Cho, Kaisa Nyberg |
Multidimensional Linear Cryptanalysis of Reduced Round Serpent. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings, pp. 203-215, 2008, Springer, 978-3-540-69971-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
42 | Tetsu Iwata, Kaoru Kurosawa |
On the Pseudorandomness of the AES Finalists - RC6 and Serpent. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 7th International Workshop, FSE 2000, New York, NY, USA, April 10-12, 2000, Proceedings, pp. 231-243, 2000, Springer, 3-540-41728-1. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
34 | Issam W. Damaj |
Parallel Algorithms Development for Programmable Devices with Application from Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Parallel Program. ![In: Int. J. Parallel Program. 35(6), pp. 529-572, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Parallel algorithms, methodologies, formal models, data encryption, gate array |
34 | Gregor Leander, Axel Poschmann |
On the Classification of 4 Bit S-Boxes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WAIFI ![In: Arithmetic of Finite Fields, First International Workshop, WAIFI 2007, Madrid, Spain, June 21-22, 2007, Proceedings, pp. 159-176, 2007, Springer, 978-3-540-73073-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Vectorial Boolean function, Affine equivalence, Hardware Implementation, S-box |
34 | Eli Biham, Orr Dunkelman, Nathan Keller |
New Results on Boomerang and Rectangle Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 9th International Workshop, FSE 2002, Leuven, Belgium, February 4-6, 2002, Revised Papers, pp. 1-16, 2002, Springer, 3-540-44009-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
34 | Pawel Chodowiec, Po Khuon, Kris Gaj |
Fast implementations of secret-key block ciphers using mixed inner- and outer-round pipelining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPGA ![In: Proceedings of the ACM/SIGDA International Symposium on Field Programmable Gate Arrays, FPGA 2001, Monterey, CA, USA, February 11-13, 2001, pp. 94-102, 2001, ACM, 1-58113-341-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
fast architectures, secret-key ciphers, pipelining, AES |
34 | Kris Gaj, Pawel Chodowiec |
Fast Implementation and Fair Comparison of the Final Candidates for Advanced Encryption Standard Using Field Programmable Gate Arrays. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2001, The Cryptographer's Track at RSA Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings, pp. 84-99, 2001, Springer, 3-540-41898-9. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
34 | Andreas Dandalis, Viktor K. Prasanna, José D. P. Rolim |
A Comparative Study of Performance of AES Final Candidates Using FPGAs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings, pp. 125-140, 2000, Springer, 3-540-41455-X. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
26 | Itai Dinur, Adi Shamir |
Generic Analysis of Small Cryptographic Leaks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FDTC ![In: 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2010, Santa Barbara, California, USA, 21 August 2010, pp. 39-48, 2010, IEEE Computer Society, 978-0-7695-4169-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
cube attacks, robust cube attacks, cryptanalysis, AES, side channel attacks, Serpent |
25 | Mohammad Shahab Sepehri, Zalan Fabian, Mahdi Soltanolkotabi |
Serpent: Scalable and Efficient Image Restoration via Multi-scale Structured State Space Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2403.17902, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
25 | Hosein Hadipour, Patrick Derbez, Maria Eichlseder |
Revisiting Differential-Linear Attacks via a Boomerang Perspective with Application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2024, pp. 255, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP BibTeX RDF |
|
25 | Chunning Zhou, Wentao Zhang, Weiwei Cao |
A New Approach of Evaluating the Security Against Differential and Linear Cryptanalysis and Its Applications to Serpent, NOEKEON and ASCON. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. J. ![In: Comput. J. 67(1), pp. 274-291, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
25 | Sadam Hussain, Muhammad Asif, Tariq Shah, Abid Mahboob, Sayed M. Eldin |
Redesigning the Serpent Algorithm by PA-Loop and Its Image Encryption Application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 11, pp. 29698-29710, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Huwaida T. I. Elshoush, Khalil T. Obeid, Mahmoud M. Mahmoud |
A Novel Approach to Improve the Performance of Serpent Algorithm using Lorenz 96 Chaos-based Block Key Generation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Hiding Multim. Signal Process. ![In: J. Inf. Hiding Multim. Signal Process. 13(1), pp. 49-63, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
25 | Huwaida T. I. Elshoush, Batool H. Abdallah, Duaa M. Ahmed, Abdalmajid A. Ishag, Sittana O. Afifi |
Expeditiousness Serpent Using CTR Mode and Logistic Map. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Hiding Multim. Signal Process. ![In: J. Inf. Hiding Multim. Signal Process. 13(4), pp. 214-225, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
25 | Khumbelo Muthavhine, Mbuyu Sumbwanyambe |
Securing IoT Devices against Differential-Linear (DL) Attack Used on Serpent Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Internet ![In: Future Internet 14(2), pp. 55, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Marek Broll, Federico Canale, Nicolas David 0001, Antonio Flórez-Gutiérrez, Gregor Leander, María Naya-Plasencia, Yosuke Todo |
New Attacks from Old Distinguishers Improved Attacks on Serpent. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2022 - Cryptographers' Track at the RSA Conference 2022, Virtual Event, March 1-2, 2022, Proceedings, pp. 484-510, 2022, Springer, 978-3-030-95311-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Huwaida T. I. Elshoush, Banan M. Al-Tayeb, Khalil T. Obeid |
Enhanced Serpent algorithm using Lorenz 96 Chaos-based block key generation and parallel computing for RGB image encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PeerJ Comput. Sci. ![In: PeerJ Comput. Sci. 7, pp. e812, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
25 | Marek Broll, Federico Canale, Nicolas David 0001, Antonio Flórez-Gutiérrez, Gregor Leander, María Naya-Plasencia, Yosuke Todo |
Further Improving Differential-Linear Attacks: Applications to Chaskey and Serpent. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2021, pp. 820, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
25 | Toni Kaltiaisenaho |
Photon transport physics in Serpent 2 Monte Carlo code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Phys. Commun. ![In: Comput. Phys. Commun. 252, pp. 107143, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
25 | Tariq Shah, Tanveer ul Haq, Ghazanfar F. Siddiqui |
Improved SERPENT Algorithm: Design to RGB Image Encryption Implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 8, pp. 52609-52621, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
25 | Petr Socha, Jan Brejník, Josep Balasch, Martin Novotný, Nele Mentens |
Side-channel countermeasures utilizing dynamic logic reconfiguration: Protecting AES/Rijndael and Serpent encryption in hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Microprocess. Microsystems ![In: Microprocess. Microsystems 78, pp. 103208, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
25 | Petr Socha, Jan Brejník, Stanislav Jerabek, Martin Novotný, Nele Mentens |
Dynamic Logic Reconfiguration Based Side-Channel Protection of AES and Serpent. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSD ![In: 22nd Euromicro Conference on Digital System Design, DSD 2019, Kallithea, Greece, August 28-30, 2019, pp. 277-282, 2019, IEEE, 978-1-7281-2862-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
25 | Thibault Manneville |
The serpent nest conjecture for accordion complexes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Eur. J. Comb. ![In: Eur. J. Comb. 67, pp. 230-238, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Mazhar Tayel, George Dawood, Hamed Shawky |
A Proposed Serpent-Elliptic Hybrid Cryptosystem For Multimedia Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICACCI ![In: 2018 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2018, Bangalore, India, September 19-22, 2018, pp. 387-391, 2018, IEEE, 978-1-5386-5314-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Frédéric Chapoton |
Stokes posets and serpent nests. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Discret. Math. Theor. Comput. Sci. ![In: Discret. Math. Theor. Comput. Sci. 18(3), 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
25 | Goutam Paul 0001, Anupam Chattopadhyay |
Three Snakes in One Hole: The First Systematic Hardware Accelerator Design for SOSEMANUK with Optional Serpent and SNOW 2.0 Modes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 65(2), pp. 640-653, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
25 | Cihangir Tezcan |
Differential Factors Revisited: Corrected Attacks on PRESENT and SERPENT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LightSec ![In: Lightweight Cryptography for Security and Privacy - 4th International Workshop, LightSec 2015, Bochum, Germany, September 10-11, 2015, Revised Selected Papers, pp. 21-33, 2015, Springer, 978-3-319-29077-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
25 | Cihangir Tezcan, Ferruh Özbudak |
Differential Factors: Improved Attacks on SERPENT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2014, pp. 860, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
25 | Cihangir Tezcan, Halil Kemal Taskin, Murat Demircioglu |
Improbable Differential Attacks on Serpent using Undisturbed Bits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014, pp. 145, 2014, ACM, 978-1-4503-3033-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
25 | Cihangir Tezcan, Ferruh Özbudak |
Differential Factors: Improved Attacks on SERPENT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LightSec ![In: Lightweight Cryptography for Security and Privacy - Third International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selected Papers, pp. 69-84, 2014, Springer, 978-3-319-16362-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
25 | Massimo Alioto, Simone Bongiovanni, Giuseppe Scotti, Alessandro Trifiletti |
Leakage Power Analysis attacks against a bit slice implementation of the Serpent block cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MIXDES ![In: Proceedings of the 21st International Conference Mixed Design of Integrated Circuits and Systems, MIXDES 2014, Lviv, Ukraine, June 19-21, 2014, pp. 241-246, 2014, IEEE. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
25 | Jialin Huang, Xuejia Lai |
Chosen-plaintext linear attacks on Serpent. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IET Inf. Secur. ![In: IET Inf. Secur. 7(4), pp. 293-299, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
25 | Luke W. Peck, Danielle M. Fenech |
SERPent: Automated reduction and RFI-mitigation software for e-MERLIN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Astron. Comput. ![In: Astron. Comput. 2, pp. 54-66, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
25 | Goutam Paul 0001, Anupam Chattopadhyay |
Three Snakes in One Hole: A 67 Gbps Flexible Hardware for SOSEMANUK with Optional Serpent and SNOW 2.0 Modes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2013, pp. 282, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
25 | James McLaughlin 0003, John A. Clark |
Filtered nonlinear cryptanalysis of reduced-round Serpent, and the Wrong-Key Randomization Hypothesis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2013, pp. 89, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
25 | James McLaughlin 0003, John A. Clark |
Nonlinear cryptanalysis of reduced-round Serpent and metaheuristic search for S-box approximations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2013, pp. 22, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
25 | Jaroslaw Sugier |
Implementing Salsa20 vs. AES and Serpent Ciphers in Popular-Grade FPGA Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DepCoS-RELCOMEX ![In: New Results in Dependability and Computer Systems - Proceedings of the 8th International Conference on Dependability and Complex Systems DepCoS-RELCOMEX, September 9-13, 2013, Brunów, Poland, pp. 431-438, 2013, Springer, 978-3-319-00944-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
25 | Aditya Yulianto, Maria Irmina Prasetiyowati |
BoxLock: Mobile-based Serpent cryptographic algorithm and One-Time Password mechanism implementation for Dropbox files security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 8th International Conference for Internet Technology and Secured Transactions, ICITST 2013, London, United Kingdom, December 9-12, 2013, pp. 357-362, 2013, IEEE, 978-1-908320-20-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
25 | Weiqiang Liu 0001, Saket Srivastava, Liang Lu, Máire O'Neill, Earl E. Swartzlander Jr. |
Power analysis attack of QCA circuits: A case study of the Serpent cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS ![In: 2013 IEEE International Symposium on Circuits and Systems (ISCAS2013), Beijing, China, May 19-23, 2013, pp. 2075-2078, 2013, IEEE, 978-1-4673-5760-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
25 | James McLaughlin 0003, John A. Clark |
Filtered Nonlinear Cryptanalysis of Reduced-Round Serpent, and the Wrong-Key Randomization Hypothesis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMACC ![In: Cryptography and Coding - 14th IMA International Conference, IMACC 2013, Oxford, UK, December 17-19, 2013. Proceedings, pp. 120-140, 2013, Springer, 978-3-642-45238-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
25 | Deukjo Hong, Bonwook Koo, Dong-Chan Kim |
Preimage and Second-Preimage Attacks on PGV Hashing Modes of Round-Reduced ARIA, Camellia, and Serpent. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(1), pp. 372-380, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
25 | Meiqin Wang, Yue Sun, Elmar Tischhauser, Bart Preneel |
A Model for Structure Attacks, with Applications to PRESENT and Serpent. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption - 19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers, pp. 49-68, 2012, Springer, 978-3-642-34046-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
25 | Christophe De Cannière |
SERPENT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Cryptography and Security (2nd Ed.) ![In: Encyclopedia of Cryptography and Security, 2nd Ed., pp. 1188-1189, 2011, Springer, 978-1-4419-5905-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
25 | Meiqin Wang, Xiaoyun Wang 0001, Lucas Chi Kwong Hui |
Differential-algebraic cryptanalysis of reduced-round of Serpent-256. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Inf. Sci. ![In: Sci. China Inf. Sci. 53(3), pp. 546-556, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
25 | Gaoli Wang, Shaohui Wang |
Improved Differential Cryptanalysis of Serpent. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 2010 International Conference on Computational Intelligence and Security, CIS 2010, Nanning, Guangxi Zhuang Autonomous Region, China, December 11-14, 2010, pp. 367-371, 2010, IEEE Computer Society, 978-1-4244-9114-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
25 | Kevin J. Compton, Brian Timm, Joel VanLaven |
A Simple Power Analysis Attack on the Serpent Key Schedule. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2009, pp. 473, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
25 | Bhupendra Singh, Lexy Alexander, Sanjay Burman |
On Algebraic Relations of Serpent S-Boxes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2009, pp. 38, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
25 | Issam W. Damaj, May Itani, Hassan B. Diab |
Serpent Cryptography on Static and Dynamic Reconfigurable Hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AICCSA ![In: 2006 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2006), March 8-11, Dubai/Sharjah, UAE, pp. 680-684, 2006, IEEE Computer Society, 1-4244-0211-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Christophe De Cannière |
Serpent. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Cryptography and Security ![In: Encyclopedia of Cryptography and Security, 2005, Springer, 978-0-387-23473-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Eli Biham, Orr Dunkelman, Nathan Keller |
The Rectangle Attack - Rectangling the Serpent. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2001, pp. 21, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP BibTeX RDF |
|
25 | Wenling Wu, Dengguo Feng, Sihan Qing |
Power Analysis of RC6 and Serpent. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Information Security for Global Information Infrastructures, IFIP TC11 Fifteenth Annual Working Conference on Information Security, August 22-24, 2000, Beijing, China, pp. 201-209, 2000, Kluwer, 0-7923-7914-4. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP BibTeX RDF |
|
25 | Dag Arne Osvik |
Speeding up Serpent. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AES Candidate Conference ![In: The Third Advanced Encryption Standard Candidate Conference, April 13-14, 2000, New York, New York, USA., pp. 317-329, 2000, National Institute of Standards and Technology,. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP BibTeX RDF |
|
25 | Tadayoshi Kohno, John Kelsey, Bruce Schneier |
Preliminary Cryptanalysis of Reduced-Round Serpent. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AES Candidate Conference ![In: The Third Advanced Encryption Standard Candidate Conference, April 13-14, 2000, New York, New York, USA., pp. 195-211, 2000, National Institute of Standards and Technology,. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP BibTeX RDF |
|
25 | Ross J. Anderson, Eli Biham, Lars R. Knudsen |
The Case for Serpent. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AES Candidate Conference ![In: The Third Advanced Encryption Standard Candidate Conference, April 13-14, 2000, New York, New York, USA., pp. 349-354, 2000, National Institute of Standards and Technology,. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP BibTeX RDF |
|
25 | Ross J. Anderson, Eli Biham, Lars R. Knudsen |
Serpent and Smartcards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CARDIS ![In: Smart Card Research and Applications, This International Conference, CARDIS '98, Louvain-la-Neuve, Belgium, September 14-16, 1998, Proceedings, pp. 246-253, 1998, Springer, 3-540-67923-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
25 | Eli Biham, Ross J. Anderson, Lars R. Knudsen |
Serpent: A New Block Cipher Proposal. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 5th International Workshop, FSE '98, Paris, France, March 23-25, 1998, Proceedings, pp. 222-238, 1998, Springer, 3-540-64265-X. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
25 | D. Akrigg, Terri K. Attwood, Alan J. Bleasby, John B. C. Findlay, A. C. North, N. A. Maughan, David J. Parry-Smith, D. N. Perkins, J. C. Wootton |
SERPENT - an information storage and analysis resource for protein sequences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Appl. Biosci. ![In: Comput. Appl. Biosci. 8(3), pp. 295-296, 1992. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
17 | Miia Hermelin, Joo Yeon Cho, Kaisa Nyberg |
Multidimensional Extension of Matsui's Algorithm 2. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 16th International Workshop, FSE 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers, pp. 209-227, 2009, Springer, 978-3-642-03316-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Côme Berbain, Olivier Billet, Anne Canteaut, Nicolas T. Courtois, Henri Gilbert, Louis Goubin, Aline Gouget, Louis Granboulan, Cédric Lauradoux, Marine Minier, Thomas Pornin, Hervé Sibert |
Sosemanuk, a Fast Software-Oriented Stream Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
The eSTREAM Finalists ![In: New Stream Cipher Designs - The eSTREAM Finalists, pp. 98-118, 2008, Springer, 978-3-540-68350-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Zhihua Hu, Zhongping Qin, Haiqing Han |
Cryptanalysis of Spent with Systems of Algebraic Equations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (4) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 4: Embedded Programming / Database Technology / Neural Networks and Applications / Other Applications, December 12-14, 2008, Wuhan, China, pp. 1097-1100, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Philipp Grabher, Johann Großschädl, Dan Page |
Light-Weight Instruction Set Extensions for Bit-Sliced Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings, pp. 331-345, 2008, Springer, 978-3-540-85052-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Johann Großschädl, Stefan Tillich, Christian Rechberger, Michael Hofmann 0007, Marcel Medwed |
Energy evaluation of software implementations of block ciphers under memory constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DATE ![In: 2007 Design, Automation and Test in Europe Conference and Exposition, DATE 2007, Nice, France, April 16-20, 2007, pp. 1110-1115, 2007, EDA Consortium, San Jose, CA, USA, 978-3-9810801-2-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
energy optimization, code size reduction, symmetric cipher, lightweight cryptography, memory footprint |
17 | Baudoin Collard, François-Xavier Standaert, Jean-Jacques Quisquater |
Improving the Time Complexity of Matsui's Linear Cryptanalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings, pp. 77-88, 2007, Springer, 978-3-540-76787-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Fast Fourier Transform, block ciphers, linear cryptanalysis |
17 | Maounil Messaoud, Fatma Zohra Nouri |
Image Restoration by Partial Differential Equations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GMAI ![In: 2006 International Conference on Geometric Modeling and Imaging, GMAI 2006, London, UK, July 5-7, 2006, pp. 250-254, 2006, IEEE Computer Society, 0-7695-2604-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Jianjun Duan, Joe Hurd, Guodong Li, Scott Owens, Konrad Slind, Junxing Zhang |
Functional Correctness Proofs of Encryption Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LPAR ![In: Logic for Programming, Artificial Intelligence, and Reasoning, 12th International Conference, LPAR 2005, Montego Bay, Jamaica, December 2-6, 2005, Proceedings, pp. 519-533, 2005, Springer, 3-540-30553-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Carlos Cid, Gaëtan Leurent |
An Analysis of the XSL Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings, pp. 333-352, 2005, Springer, 3-540-30684-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
XSL algorithm, T? method, AES, Linearization |
17 | Armando Solar-Lezama, Rodric M. Rabbah, Rastislav Bodík, Kemal Ebcioglu |
Programming by sketching for bit-streaming programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLDI ![In: Proceedings of the ACM SIGPLAN 2005 Conference on Programming Language Design and Implementation, Chicago, IL, USA, June 12-15, 2005, pp. 281-294, 2005, ACM, 1-59593-056-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
domain specific compiler, domain specific language, sketching, synchronous dataflow, stream programming, StreamIt |
17 | Abbas Ghaemi Bafghi, Babak Sadeghiyan |
Finding suitable differential characteristics for block ciphers with Ant colony technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28 - July 1, 2004, Alexandria, Egypt, pp. 418-423, 2004, IEEE Computer Society, 0-7803-8623-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Bo-Yin Yang, Jiun-Ming Chen |
Theoretical Analysis of XL over Small Fields. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings, pp. 277-288, 2004, Springer, 3-540-22379-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Greg Snider, Barry Shackleford, Richard J. Carter |
Attacking the semantic gap between application programming languages and configurable hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPGA ![In: Proceedings of the ACM/SIGDA International Symposium on Field Programmable Gate Arrays, FPGA 2001, Monterey, CA, USA, February 11-13, 2001, pp. 115-124, 2001, ACM, 1-58113-341-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
17 | Routo Terada, Paulo G. Pinheiro |
Quadratic Relations for S-Boxes: Their Minimum Representations and Bounds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 4th International Conference, ISC 2001, Malaga, Spain, October 1-3, 2001, Proceedings, pp. 294-309, 2001, Springer, 3-540-42662-0. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
17 | Eli Biham, Vladimir Furman, Michal Misztal, Vincent Rijmen |
Differential Cryptanalysis of Q. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 8th International Workshop, FSE 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers, pp. 174-186, 2001, Springer, 3-540-43869-6. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
17 | Kazumaro Aoki, Tetsuya Ichikawa, Masayuki Kanda, Mitsuru Matsui, Shiho Moriai, Junko Nakajima, Toshio Tokita |
Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 7th Annual International Workshop, SAC 2000, Waterloo, Ontario, Canada, August 14-15, 2000, Proceedings, pp. 39-56, 2000, Springer, 3-540-42069-X. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Joan Daemen, Michaël Peeters, Gilles Van Assche |
Bitslice Ciphers and Power Analysis Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 7th International Workshop, FSE 2000, New York, NY, USA, April 10-12, 2000, Proceedings, pp. 134-149, 2000, Springer, 3-540-41728-1. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Lars R. Knudsen |
Advanced Encryption Standard (AES) - An Update. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMACC ![In: Cryptography and Coding, 7th IMA International Conference, Cirencester, UK, December 20-22, 1999, Proceedings, pp. 185, 1999, Springer, 3-540-66887-X. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|