The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Serpent with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1992-2000 (15) 2001-2004 (17) 2005-2008 (20) 2009-2013 (18) 2014-2021 (15) 2022-2024 (8)
Publication types (Num. hits)
article(28) incollection(3) inproceedings(62)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 72 occurrences of 45 keywords

Results
Found 93 publication records. Showing 93 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
102Baudoin Collard, François-Xavier Standaert, Jean-Jacques Quisquater Improved and Multiple Linear Cryptanalysis of Reduced Round Serpent. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF multiple linear cryptanalysis, Advanced Encryption Standard, branch-and-bound, linear cryptanalysis, linear approximations, Serpent
94Nicolas T. Courtois, Josef Pieprzyk Cryptanalysis of Block Ciphers with Overdefined Systems of Equations. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF MQ problem, overdefined systems of multivariate equations, Gröbner bases, sparse multivariate polynomials, Multivariate Cryptanalysis, Block ciphers, AES, Rijndael, Square, Camellia, Serpent, XL algorithm, multivariate quadratic equations
93Orr Dunkelman, Sebastiaan Indesteege, Nathan Keller A Differential-Linear Attack on 12-Round Serpent. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
93Jesús Lázaro 0001, Armando Astarloa, Jagoba Arias, Unai Bidarte, Carlos Cuadrado High Throughput Serpent Encryption Implementation. Search on Bibsonomy FPL The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
93Eli Biham, Orr Dunkelman, Nathan Keller Differential-Linear Cryptanalysis of Serpent. Search on Bibsonomy FSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
93Eli Biham, Orr Dunkelman, Nathan Keller Linear Cryptanalysis of Reduced Round Serpent. Search on Bibsonomy FSE The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
85Joo Yeon Cho, Miia Hermelin, Kaisa Nyberg A New Technique for Multidimensional Linear Cryptanalysis with Applications on Reduced Round Serpent. Search on Bibsonomy ICISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Multidimensional Linear Approximation, Block Ciphers, Linear Cryptanalysis, Serpent
76Adrian K. Lutz, Jürg Treichler, Frank K. Gürkaynak, Hubert Kaeslin, Gérard Basler, Antonia Erni, Stephan Reichmuth, Pieter Rommens, Stephan Oetiker, Wolfgang Fichtner 2Gbit/s Hardware Realizations of RIJNDAEL and SERPENT: A Comparative Analysis. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
76Eli Biham, Orr Dunkelman, Nathan Keller The Rectangle Attack - Rectangling the Serpent. Search on Bibsonomy EUROCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
76Adam J. Elbirt, Christof Paar An FPGA implementation and performance evaluation of the Serpent block cipher. Search on Bibsonomy FPGA The full citation details ... 2000 DBLP  DOI  BibTeX  RDF algorithm-agility, FPGA, cryptography, VHDL, block cipher
60Alex Biryukov, Christophe De Cannière Block Ciphers and Systems of Quadratic Equations. Search on Bibsonomy FSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Khazad, Misty, Block ciphers, linearization, Rijndael, Camellia, Serpent, multivariate quadratic equations
59John Kelsey, Tadayoshi Kohno, Bruce Schneier Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent. Search on Bibsonomy FSE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
59Cameron Patterson A Dynamic FPGA Implementation of the Serpent Block Cipher. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
43Muhammad Reza Z'aba, Håvard Raddum, Matthew Henricksen, Ed Dawson Bit-Pattern Based Integral Attack. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF integral cryptanalysis, Noekeon, Block ciphers, present, Serpent
43Nicolas T. Courtois, Blandine Debraize Specific S-Box Criteria in Algebraic Attacks on Block Ciphers with Several Known Plaintexts. Search on Bibsonomy WEWoRC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF algebraic attacks on block ciphers, Gröbner bases, design of S-boxes, Rijndael, algebraic immunity, Serpent, multivariate equations
43Nicolas T. Courtois General Principles of Algebraic Attacks and New Design Criteria for Cipher Components. Search on Bibsonomy AES Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF polynomial relations, design of cryptographic primitives, generalised linear cryptanalysis, multivariate public key encryption and signature schemes, Quartz, combiners with memory, elimination methods, Gröbner bases, Boolean functions, stream ciphers, block ciphers, AES, finite fields, algebraic attacks, Rijndael, Serpent, HFE, Sflash, multivariate equations
42Baudoin Collard, François-Xavier Standaert, Jean-Jacques Quisquater Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
42Miia Hermelin, Joo Yeon Cho, Kaisa Nyberg Multidimensional Linear Cryptanalysis of Reduced Round Serpent. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
42Tetsu Iwata, Kaoru Kurosawa On the Pseudorandomness of the AES Finalists - RC6 and Serpent. Search on Bibsonomy FSE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
34Issam W. Damaj Parallel Algorithms Development for Programmable Devices with Application from Cryptography. Search on Bibsonomy Int. J. Parallel Program. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Parallel algorithms, methodologies, formal models, data encryption, gate array
34Gregor Leander, Axel Poschmann On the Classification of 4 Bit S-Boxes. Search on Bibsonomy WAIFI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Vectorial Boolean function, Affine equivalence, Hardware Implementation, S-box
34Eli Biham, Orr Dunkelman, Nathan Keller New Results on Boomerang and Rectangle Attacks. Search on Bibsonomy FSE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
34Pawel Chodowiec, Po Khuon, Kris Gaj Fast implementations of secret-key block ciphers using mixed inner- and outer-round pipelining. Search on Bibsonomy FPGA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF fast architectures, secret-key ciphers, pipelining, AES
34Kris Gaj, Pawel Chodowiec Fast Implementation and Fair Comparison of the Final Candidates for Advanced Encryption Standard Using Field Programmable Gate Arrays. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
34Andreas Dandalis, Viktor K. Prasanna, José D. P. Rolim A Comparative Study of Performance of AES Final Candidates Using FPGAs. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
26Itai Dinur, Adi Shamir Generic Analysis of Small Cryptographic Leaks. Search on Bibsonomy FDTC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF cube attacks, robust cube attacks, cryptanalysis, AES, side channel attacks, Serpent
25Mohammad Shahab Sepehri, Zalan Fabian, Mahdi Soltanolkotabi Serpent: Scalable and Efficient Image Restoration via Multi-scale Structured State Space Models. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
25Hosein Hadipour, Patrick Derbez, Maria Eichlseder Revisiting Differential-Linear Attacks via a Boomerang Perspective with Application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
25Chunning Zhou, Wentao Zhang, Weiwei Cao A New Approach of Evaluating the Security Against Differential and Linear Cryptanalysis and Its Applications to Serpent, NOEKEON and ASCON. Search on Bibsonomy Comput. J. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
25Sadam Hussain, Muhammad Asif, Tariq Shah, Abid Mahboob, Sayed M. Eldin Redesigning the Serpent Algorithm by PA-Loop and Its Image Encryption Application. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
25Huwaida T. I. Elshoush, Khalil T. Obeid, Mahmoud M. Mahmoud A Novel Approach to Improve the Performance of Serpent Algorithm using Lorenz 96 Chaos-based Block Key Generation. Search on Bibsonomy J. Inf. Hiding Multim. Signal Process. The full citation details ... 2022 DBLP  BibTeX  RDF
25Huwaida T. I. Elshoush, Batool H. Abdallah, Duaa M. Ahmed, Abdalmajid A. Ishag, Sittana O. Afifi Expeditiousness Serpent Using CTR Mode and Logistic Map. Search on Bibsonomy J. Inf. Hiding Multim. Signal Process. The full citation details ... 2022 DBLP  BibTeX  RDF
25Khumbelo Muthavhine, Mbuyu Sumbwanyambe Securing IoT Devices against Differential-Linear (DL) Attack Used on Serpent Algorithm. Search on Bibsonomy Future Internet The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
25Marek Broll, Federico Canale, Nicolas David 0001, Antonio Flórez-Gutiérrez, Gregor Leander, María Naya-Plasencia, Yosuke Todo New Attacks from Old Distinguishers Improved Attacks on Serpent. Search on Bibsonomy CT-RSA The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
25Huwaida T. I. Elshoush, Banan M. Al-Tayeb, Khalil T. Obeid Enhanced Serpent algorithm using Lorenz 96 Chaos-based block key generation and parallel computing for RGB image encryption. Search on Bibsonomy PeerJ Comput. Sci. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
25Marek Broll, Federico Canale, Nicolas David 0001, Antonio Flórez-Gutiérrez, Gregor Leander, María Naya-Plasencia, Yosuke Todo Further Improving Differential-Linear Attacks: Applications to Chaskey and Serpent. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2021 DBLP  BibTeX  RDF
25Toni Kaltiaisenaho Photon transport physics in Serpent 2 Monte Carlo code. Search on Bibsonomy Comput. Phys. Commun. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
25Tariq Shah, Tanveer ul Haq, Ghazanfar F. Siddiqui Improved SERPENT Algorithm: Design to RGB Image Encryption Implementation. Search on Bibsonomy IEEE Access The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
25Petr Socha, Jan Brejník, Josep Balasch, Martin Novotný, Nele Mentens Side-channel countermeasures utilizing dynamic logic reconfiguration: Protecting AES/Rijndael and Serpent encryption in hardware. Search on Bibsonomy Microprocess. Microsystems The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
25Petr Socha, Jan Brejník, Stanislav Jerabek, Martin Novotný, Nele Mentens Dynamic Logic Reconfiguration Based Side-Channel Protection of AES and Serpent. Search on Bibsonomy DSD The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
25Thibault Manneville The serpent nest conjecture for accordion complexes. Search on Bibsonomy Eur. J. Comb. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
25Mazhar Tayel, George Dawood, Hamed Shawky A Proposed Serpent-Elliptic Hybrid Cryptosystem For Multimedia Protection. Search on Bibsonomy ICACCI The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
25Frédéric Chapoton Stokes posets and serpent nests. Search on Bibsonomy Discret. Math. Theor. Comput. Sci. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
25Goutam Paul 0001, Anupam Chattopadhyay Three Snakes in One Hole: The First Systematic Hardware Accelerator Design for SOSEMANUK with Optional Serpent and SNOW 2.0 Modes. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
25Cihangir Tezcan Differential Factors Revisited: Corrected Attacks on PRESENT and SERPENT. Search on Bibsonomy LightSec The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
25Cihangir Tezcan, Ferruh Özbudak Differential Factors: Improved Attacks on SERPENT. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2014 DBLP  BibTeX  RDF
25Cihangir Tezcan, Halil Kemal Taskin, Murat Demircioglu Improbable Differential Attacks on Serpent using Undisturbed Bits. Search on Bibsonomy SIN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
25Cihangir Tezcan, Ferruh Özbudak Differential Factors: Improved Attacks on SERPENT. Search on Bibsonomy LightSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
25Massimo Alioto, Simone Bongiovanni, Giuseppe Scotti, Alessandro Trifiletti Leakage Power Analysis attacks against a bit slice implementation of the Serpent block cipher. Search on Bibsonomy MIXDES The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
25Jialin Huang, Xuejia Lai Chosen-plaintext linear attacks on Serpent. Search on Bibsonomy IET Inf. Secur. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
25Luke W. Peck, Danielle M. Fenech SERPent: Automated reduction and RFI-mitigation software for e-MERLIN. Search on Bibsonomy Astron. Comput. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
25Goutam Paul 0001, Anupam Chattopadhyay Three Snakes in One Hole: A 67 Gbps Flexible Hardware for SOSEMANUK with Optional Serpent and SNOW 2.0 Modes. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2013 DBLP  BibTeX  RDF
25James McLaughlin 0003, John A. Clark Filtered nonlinear cryptanalysis of reduced-round Serpent, and the Wrong-Key Randomization Hypothesis. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2013 DBLP  BibTeX  RDF
25James McLaughlin 0003, John A. Clark Nonlinear cryptanalysis of reduced-round Serpent and metaheuristic search for S-box approximations. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2013 DBLP  BibTeX  RDF
25Jaroslaw Sugier Implementing Salsa20 vs. AES and Serpent Ciphers in Popular-Grade FPGA Devices. Search on Bibsonomy DepCoS-RELCOMEX The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
25Aditya Yulianto, Maria Irmina Prasetiyowati BoxLock: Mobile-based Serpent cryptographic algorithm and One-Time Password mechanism implementation for Dropbox files security. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
25Weiqiang Liu 0001, Saket Srivastava, Liang Lu, Máire O'Neill, Earl E. Swartzlander Jr. Power analysis attack of QCA circuits: A case study of the Serpent cipher. Search on Bibsonomy ISCAS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
25James McLaughlin 0003, John A. Clark Filtered Nonlinear Cryptanalysis of Reduced-Round Serpent, and the Wrong-Key Randomization Hypothesis. Search on Bibsonomy IMACC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
25Deukjo Hong, Bonwook Koo, Dong-Chan Kim Preimage and Second-Preimage Attacks on PGV Hashing Modes of Round-Reduced ARIA, Camellia, and Serpent. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
25Meiqin Wang, Yue Sun, Elmar Tischhauser, Bart Preneel A Model for Structure Attacks, with Applications to PRESENT and Serpent. Search on Bibsonomy FSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
25Christophe De Cannière SERPENT. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
25Meiqin Wang, Xiaoyun Wang 0001, Lucas Chi Kwong Hui Differential-algebraic cryptanalysis of reduced-round of Serpent-256. Search on Bibsonomy Sci. China Inf. Sci. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
25Gaoli Wang, Shaohui Wang Improved Differential Cryptanalysis of Serpent. Search on Bibsonomy CIS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
25Kevin J. Compton, Brian Timm, Joel VanLaven A Simple Power Analysis Attack on the Serpent Key Schedule. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2009 DBLP  BibTeX  RDF
25Bhupendra Singh, Lexy Alexander, Sanjay Burman On Algebraic Relations of Serpent S-Boxes. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2009 DBLP  BibTeX  RDF
25Issam W. Damaj, May Itani, Hassan B. Diab Serpent Cryptography on Static and Dynamic Reconfigurable Hardware. Search on Bibsonomy AICCSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25Christophe De Cannière Serpent. Search on Bibsonomy Encyclopedia of Cryptography and Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
25Eli Biham, Orr Dunkelman, Nathan Keller The Rectangle Attack - Rectangling the Serpent. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2001 DBLP  BibTeX  RDF
25Wenling Wu, Dengguo Feng, Sihan Qing Power Analysis of RC6 and Serpent. Search on Bibsonomy SEC The full citation details ... 2000 DBLP  BibTeX  RDF
25Dag Arne Osvik Speeding up Serpent. Search on Bibsonomy AES Candidate Conference The full citation details ... 2000 DBLP  BibTeX  RDF
25Tadayoshi Kohno, John Kelsey, Bruce Schneier Preliminary Cryptanalysis of Reduced-Round Serpent. Search on Bibsonomy AES Candidate Conference The full citation details ... 2000 DBLP  BibTeX  RDF
25Ross J. Anderson, Eli Biham, Lars R. Knudsen The Case for Serpent. Search on Bibsonomy AES Candidate Conference The full citation details ... 2000 DBLP  BibTeX  RDF
25Ross J. Anderson, Eli Biham, Lars R. Knudsen Serpent and Smartcards. Search on Bibsonomy CARDIS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
25Eli Biham, Ross J. Anderson, Lars R. Knudsen Serpent: A New Block Cipher Proposal. Search on Bibsonomy FSE The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
25D. Akrigg, Terri K. Attwood, Alan J. Bleasby, John B. C. Findlay, A. C. North, N. A. Maughan, David J. Parry-Smith, D. N. Perkins, J. C. Wootton SERPENT - an information storage and analysis resource for protein sequences. Search on Bibsonomy Comput. Appl. Biosci. The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
17Miia Hermelin, Joo Yeon Cho, Kaisa Nyberg Multidimensional Extension of Matsui's Algorithm 2. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Côme Berbain, Olivier Billet, Anne Canteaut, Nicolas T. Courtois, Henri Gilbert, Louis Goubin, Aline Gouget, Louis Granboulan, Cédric Lauradoux, Marine Minier, Thomas Pornin, Hervé Sibert Sosemanuk, a Fast Software-Oriented Stream Cipher. Search on Bibsonomy The eSTREAM Finalists The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Zhihua Hu, Zhongping Qin, Haiqing Han Cryptanalysis of Spent with Systems of Algebraic Equations. Search on Bibsonomy CSSE (4) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Philipp Grabher, Johann Großschädl, Dan Page Light-Weight Instruction Set Extensions for Bit-Sliced Cryptography. Search on Bibsonomy CHES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Johann Großschädl, Stefan Tillich, Christian Rechberger, Michael Hofmann 0007, Marcel Medwed Energy evaluation of software implementations of block ciphers under memory constraints. Search on Bibsonomy DATE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF energy optimization, code size reduction, symmetric cipher, lightweight cryptography, memory footprint
17Baudoin Collard, François-Xavier Standaert, Jean-Jacques Quisquater Improving the Time Complexity of Matsui's Linear Cryptanalysis. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Fast Fourier Transform, block ciphers, linear cryptanalysis
17Maounil Messaoud, Fatma Zohra Nouri Image Restoration by Partial Differential Equations. Search on Bibsonomy GMAI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Jianjun Duan, Joe Hurd, Guodong Li, Scott Owens, Konrad Slind, Junxing Zhang Functional Correctness Proofs of Encryption Algorithms. Search on Bibsonomy LPAR The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Carlos Cid, Gaëtan Leurent An Analysis of the XSL Algorithm. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF XSL algorithm, T? method, AES, Linearization
17Armando Solar-Lezama, Rodric M. Rabbah, Rastislav Bodík, Kemal Ebcioglu Programming by sketching for bit-streaming programs. Search on Bibsonomy PLDI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF domain specific compiler, domain specific language, sketching, synchronous dataflow, stream programming, StreamIt
17Abbas Ghaemi Bafghi, Babak Sadeghiyan Finding suitable differential characteristics for block ciphers with Ant colony technique. Search on Bibsonomy ISCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Bo-Yin Yang, Jiun-Ming Chen Theoretical Analysis of XL over Small Fields. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Greg Snider, Barry Shackleford, Richard J. Carter Attacking the semantic gap between application programming languages and configurable hardware. Search on Bibsonomy FPGA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
17Routo Terada, Paulo G. Pinheiro Quadratic Relations for S-Boxes: Their Minimum Representations and Bounds. Search on Bibsonomy ISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
17Eli Biham, Vladimir Furman, Michal Misztal, Vincent Rijmen Differential Cryptanalysis of Q. Search on Bibsonomy FSE The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
17Kazumaro Aoki, Tetsuya Ichikawa, Masayuki Kanda, Mitsuru Matsui, Shiho Moriai, Junko Nakajima, Toshio Tokita Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
17Joan Daemen, Michaël Peeters, Gilles Van Assche Bitslice Ciphers and Power Analysis Attacks. Search on Bibsonomy FSE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
17Lars R. Knudsen Advanced Encryption Standard (AES) - An Update. Search on Bibsonomy IMACC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #93 of 93 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license