|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 25 occurrences of 25 keywords
|
|
|
Results
Found 50 publication records. Showing 50 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
214 | Eli Biham, Vladimir Furman |
Improved Impossible Differentials on Twofish. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2000, First International Conference in Cryptology in India, Calcutta, India, December 10-13, 2000, Proceedings, pp. 80-92, 2000, Springer, 3-540-41452-5. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Twofish, cryptanalysis, impossible differential |
106 | Bruce Schneier, John Kelsey, Doug Whiting, David A. Wagner 0001, Chris Hall |
On the Twofish Key Schedule. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography '98, SAC'98, Kingston, Ontario, Canada, August 17-18, 1998, Proceedings, pp. 27-42, 1998, Springer, 3-540-65894-7. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
70 | Helger Lipmaa |
On Differential Properties of Pseudo-Hadamard Transform and Related Mappings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2002, Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002, pp. 48-61, 2002, Springer, 3-540-00263-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
differential probability, Pseudo-Hadamard Transform, Twofish, linear functions |
67 | Stefan Lucks |
The Saturation Attack - A Bait for Twofish. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 8th International Workshop, FSE 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers, pp. 1-15, 2001, Springer, 3-540-43869-6. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
50 | Nikhil Joshi, Jayachandran Sundararajan, Kaijie Wu 0001, Bo Yang 0010, Ramesh Karri |
Tamper Proofing by Design Using Generalized Involution-Based Concurrent Error Detection for Involutional Substitution Permutation and Feistel Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 55(10), pp. 1230-1239, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Subsitution Permutation Networks (SPN), ANUBIS, TwoFish, cryptography, Concurrent Error Detection (CED), tamper proofing, Feistel networks |
39 | Pawel Chodowiec, Po Khuon, Kris Gaj |
Fast implementations of secret-key block ciphers using mixed inner- and outer-round pipelining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPGA ![In: Proceedings of the ACM/SIGDA International Symposium on Field Programmable Gate Arrays, FPGA 2001, Monterey, CA, USA, February 11-13, 2001, pp. 94-102, 2001, ACM, 1-58113-341-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
fast architectures, secret-key ciphers, pipelining, AES |
28 | Maddila Suresh Kumar, Vadlamani Nagalakshmi |
A Novel Efficient Hybrid Encryption Algorithm Based on Twofish and Key Generation Using Optimization for Ensuring Data Security in Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Knowl. Manag. ![In: J. Inf. Knowl. Manag. 23(1), pp. 2350062:1-2350062:28, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
28 | Pramod Singh Rathore, Mrinal Kanti Sarkar |
Defending Against Wormhole Attacks in Wireless Networks Using the Twofish Algorithm: A Performance Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCWC ![In: 14th IEEE Annual Computing and Communication Workshop and Conference, CCWC 2024, Las Vegas, NV, USA, January 8-10, 2024, pp. 583-588, 2024, IEEE, 979-8-3503-6013-4. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
28 | A. Jenice Prabhu, S. Vallisree, S. N. Kumar, Ramachandran Sitharthan, M. Rajesh 0001, A. Ahilan, M. Usha |
Efficient Data Security Using Hybrid RSA-TWOFISH Encryption Technique on Cloud Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FICTA (2) ![In: Intelligent Data Engineering and Analytics - Proceedings of the 11th International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA 2023), Cardiff, UK, 11-12 April 2023., pp. 495-502, 2023, Springer, 978-981-99-6705-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Gabriela Mogos |
Quantum Biometric Fingerprint Encryption based on Twofish Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISOCC ![In: 20th International SoC Design Conference, ISOCC 2023, Jeju, Republic of Korea, October 25-28, 2023, pp. 187-188, 2023, IEEE, 979-8-3503-2703-8. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Haneen Khalid Alabdulrazzaq, Mohammed N. Alenezi |
Performance Evaluation of Cryptographic Algorithms: DES, 3DES, Blowfish, Twofish, and Threefish. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Commun. Networks Inf. Secur. ![In: Int. J. Commun. Networks Inf. Secur. 14(1), April 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
28 | Tanveer ul Haq, Tariq Shah, Ghazanfar Farooq Siddiqui, Muhammad Zafar Iqbal, Ibrahim A. Hameed, Huma Jamil |
Improved Twofish Algorithm: A Digital Image Enciphering Application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 9, pp. 76518-76530, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
28 | Hasan Dibas, Khair Eddin Sabri |
A comprehensive performance empirical study of the symmetric algorithms: AES, 3DES, Blowfish and Twofish. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIT ![In: International Conference on Information Technology, ICIT 2021, Amman, Jordan, July 14-15, 2021, pp. 344-349, 2021, IEEE, 978-1-6654-2870-5. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
28 | Suhad Muhajer Kareem, Abdul Monem S. Rahma |
A novel approach for the development of the Twofish algorithm based on multi-level key space. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Secur. Appl. ![In: J. Inf. Secur. Appl. 50, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Elza Jintcharadze, Maksim Iavich |
Hybrid Implementation of Twofish, AES, ElGamal and RSA Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EWDTS ![In: IEEE East-West Design & Test Symposium, EWDTS 2020, Varna, Bulgaria, September 4-7, 2020, pp. 1-5, 2020, IEEE, 978-1-7281-9899-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Rolou Lyn Rodriguez Maata, Ronald S. Cordova, Alrence Halibas |
Performance Analysis of Twofish Cryptography Algorithm in Big Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSIE ![In: ICSIE 2020: 2020 9th International Conference on Software and Information Engineering, Cairo, Egypt, November, 2020, pp. 56-60, 2020, ACM, 978-1-4503-7721-8. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Duisen Gulsezim, Seiitkaliyeva Zhansaya, Abdul Razaque, Yestayeva Ramina, Fathi H. Amsaad 0001, Muder Almiani, Raouf M. Ganda, Ahmed Oun |
Two Factor Authentication using Twofish Encryption and Visual Cryptography Algorithms for Secure Data Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IoTSMS ![In: Sixth International Conference on Internet of Things: Systems, Management and Security, IOTSMS 2019, Granada, Spain, October 22-25, 2019, pp. 405-411, 2019, IEEE, 978-1-7281-2949-5. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | David Smekal, Jan Hajny, Zdenek Martinasek |
Hardware-Accelerated Twofish Core for FPGA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TSP ![In: 41st International Conference on Telecommunications and Signal Processing, TSP 2018, Athens, Greece, July 4-6, 2018, pp. 1-5, 2018, IEEE, 978-1-5386-4695-3. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Chujiao Ma, John A. Chandy, Zhijie Shi |
Algebraic Side-Channel Attack on Twofish. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Internet Serv. Inf. Secur. ![In: J. Internet Serv. Inf. Secur. 7(2), pp. 32-43, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Irfan A. Landge, B. K. Mishra |
Comparing VHDL Based Hardware Implementation of Blowfish and Twofish Algorithms for Designing Secured Embedded System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICBA (1) ![In: Computational Intelligence, Communications, and Business Analytics - First International Conference, CICBA 2017, Kolkata, India, March 24-25, 2017, Revised Selected Papers, Part I, pp. 567-581, 2017, Springer, 978-981-10-6426-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Jose Javier Gonzalez Ortiz, Kevin J. Compton |
A Simple Power Analysis Attack on the Twofish Key Schedule. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1611.07109, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
28 | Pablo Freyre, Nelson Díaz, Oristela Cuellar |
Variations to the Cryptographics Algorithms AES and Twofish. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2015, pp. 1080, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
28 | Uli Kretzschmar, Armando Astarloa, Jesús Lázaro 0001 |
SEU Resilience of DES, AES and Twofish in SRAM-Based FPGA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARC ![In: Reconfigurable Computing: Architectures, Tools and Applications - 9th International Symposium, ARC 2013, Los Angeles, CA, USA, March 25-27, 2013. Proceedings, pp. 37-46, 2013, Springer, 978-3-642-36811-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Sohaib Majzoub, Hassan B. Diab |
MorphoSys reconfigurable hardware for cryptography: the twofish case. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Supercomput. ![In: J. Supercomput. 59(1), pp. 22-41, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Subidh Ali, Debdeep Mukhopadhyay |
Differential Fault Analysis of Twofish. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology - 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers, pp. 10-28, 2012, Springer, 978-3-642-38518-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Christophe De Cannière |
TWOFISH. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Cryptography and Security (2nd Ed.) ![In: Encyclopedia of Cryptography and Security, 2nd Ed., pp. 1339-1340, 2011, Springer, 978-1-4419-5905-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Seon-Keun Lee, Sun-Yeob Kim, Yoo-Chan Ra |
A Study on the Twofish Security Processor Design Using USB Interface Device. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICHIT (2) ![In: Convergence and Hybrid Information Technology - 5th International Conference, ICHIT 2011, Daejeon, Korea, September 22-24, 2011. Proceedings, pp. 182-189, 2011, Springer, 978-3-642-24105-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Christophe De Cannière |
Twofish. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Cryptography and Security ![In: Encyclopedia of Cryptography and Security, 2005, Springer, 978-0-387-23473-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Choong-Mo Youn, Beom-Geun Lee |
High-speed Hardware Design for the Twofish Encryption Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inform. and Commun. Convergence Engineering ![In: J. Inform. and Commun. Convergence Engineering 3(4), pp. 201-204, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
28 | Marco Macchetti |
Characteristics of Key-Dependent S-Boxes: the Case of Twofish. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2005, pp. 115, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
28 | Gianluca Catalini, Franco Chiaraluce, Lorenzo Ciccarelli, Ennio Gambi, Paola Pierleoni, Maurizio Reginelli |
Modified twofish algorithm for increasing security and efficiency in the encryption of video signals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP (1) ![In: Proceedings of the 2003 International Conference on Image Processing, ICIP 2003, Barcelona, Catalonia, Spain, September 14-18, 2003, pp. 525-528, 2003, IEEE, 0-7803-7750-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Stefan Lucks |
The Saturation Attack - a Bait for Twofish. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2000, pp. 46, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP BibTeX RDF |
|
28 | Bruce Schneier, John Kelsey, Doug Whiting, David A. Wagner 0001, Niels Ferguson |
Comments on Twofish as an AES Candidate. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AES Candidate Conference ![In: The Third Advanced Encryption Standard Candidate Conference, April 13-14, 2000, New York, New York, USA., pp. 355-356, 2000, National Institute of Standards and Technology,. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP BibTeX RDF |
|
28 | Bruce Schneier, Doug Whiting |
Twofish on Smart Cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CARDIS ![In: Smart Card Research and Applications, This International Conference, CARDIS '98, Louvain-la-Neuve, Belgium, September 14-16, 1998, Proceedings, pp. 265-276, 1998, Springer, 3-540-67923-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
19 | Joana Treger, Jacques Patarin |
Generic Attacks on Feistel Networks with Internal Permutations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFRICACRYPT ![In: Progress in Cryptology - AFRICACRYPT 2009, Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. Proceedings, pp. 41-59, 2009, Springer, 978-3-642-02383-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Stefan Tillich, Johann Großschädl |
VLSI Implementation of a Functional Unit to Accelerate ECC and AES on 32-Bit Processors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WAIFI ![In: Arithmetic of Finite Fields, First International Workshop, WAIFI 2007, Madrid, Spain, June 21-22, 2007, Proceedings, pp. 40-54, 2007, Springer, 978-3-540-73073-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Johann Großschädl, Stefan Tillich, Christian Rechberger, Michael Hofmann 0007, Marcel Medwed |
Energy evaluation of software implementations of block ciphers under memory constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DATE ![In: 2007 Design, Automation and Test in Europe Conference and Exposition, DATE 2007, Nice, France, April 16-20, 2007, pp. 1110-1115, 2007, EDA Consortium, San Jose, CA, USA, 978-3-9810801-2-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
energy optimization, code size reduction, symmetric cipher, lightweight cryptography, memory footprint |
19 | Sohaib Majzoub, Hassan B. Diab |
Mapping and Performance Analysis of Lookup Table Implementations on Reconfigurable Platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AICCSA ![In: 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 13-16 May 2007, Amman, Jordan, pp. 513-520, 2007, IEEE Computer Society, 1-4244-1030-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Jianjun Duan, Joe Hurd, Guodong Li, Scott Owens, Konrad Slind, Junxing Zhang |
Functional Correctness Proofs of Encryption Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LPAR ![In: Logic for Programming, Artificial Intelligence, and Reasoning, 12th International Conference, LPAR 2005, Montego Bay, Jamaica, December 2-6, 2005, Proceedings, pp. 519-533, 2005, Springer, 3-540-30553-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
19 | A. Murat Fiskiran, Ruby B. Lee |
Fast Parallel Table Lookups to Accelerate Symmetric-Key Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (1) ![In: International Symposium on Information Technology: Coding and Computing (ITCC 2005), Volume 1, 4-6 April 2005, Las Vegas, Nevada, USA, pp. 526-531, 2005, IEEE Computer Society, 0-7695-2315-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Thilo Pionteck, Thorsten Staake, Thomas Stiefmeier, Lukusa D. Kabulepa, Manfred Glesner |
On the design of a function-specific reconfigurable: hardware accelerator for the MAC-layer in WLANs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPGA ![In: Proceedings of the ACM/SIGDA 12th International Symposium on Field Programmable Gate Arrays, FPGA 2004, Monterey, California, USA, February 22-24, 2004, pp. 258, 2004, ACM, 1-58113-829-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Helger Lipmaa, Johan Wallén, Philippe Dumas 0001 |
On the Additive Differential Probability of Exclusive-Or. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 11th International Workshop, FSE 2004, Delhi, India, February 5-7, 2004, Revised Papers, pp. 317-331, 2004, Springer, 3-540-22171-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Additive differential probability, differential cryptanalysis, rational series |
19 | Gregory G. Rose, Philip Hawkes |
Turing: A Fast Stream Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 10th International Workshop, FSE 2003, Lund, Sweden, February 24-26, 2003, Revised Papers, pp. 290-306, 2003, Springer, 3-540-20449-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Niels Ferguson, Doug Whiting, Bruce Schneier, John Kelsey, Stefan Lucks, Tadayoshi Kohno |
Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 10th International Workshop, FSE 2003, Lund, Sweden, February 24-26, 2003, Revised Papers, pp. 330-346, 2003, Springer, 3-540-20449-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
authentication, Stream cipher, encryption, MAC |
19 | Helger Lipmaa |
Fast Software Implementations of SC2000. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 5th International Conference, ISC 2002 Sao Paulo, Brazil, September 30 - October 2, 2002, Proceedings, pp. 63-74, 2002, Springer, 3-540-44270-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Block cipher design, large S-boxes, SC2000, fast implementation |
19 | Marcin Gomulkiewicz, Miroslaw Kutylowski |
Hamming Weight Attacks on Cryptographic Hardware - Breaking Masking Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2002, 7th European Symposium on Research in Computer Security, Zurich, Switzerland, October 14-16, 2002, Proceedings, pp. 90-103, 2002, Springer, 3-540-44345-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
power analysis, side channel cryptanalysis, Hamming weight, cryptographic hardware |
19 | Kazumaro Aoki, Tetsuya Ichikawa, Masayuki Kanda, Mitsuru Matsui, Shiho Moriai, Junko Nakajima, Toshio Tokita |
Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 7th Annual International Workshop, SAC 2000, Waterloo, Ontario, Canada, August 14-15, 2000, Proceedings, pp. 39-56, 2000, Springer, 3-540-42069-X. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
19 | Andreas Dandalis, Viktor K. Prasanna, José D. P. Rolim |
A Comparative Study of Performance of AES Final Candidates Using FPGAs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings, pp. 125-140, 2000, Springer, 3-540-41455-X. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
19 | Lars R. Knudsen |
Advanced Encryption Standard (AES) - An Update. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMACC ![In: Cryptography and Coding, 7th IMA International Conference, Cirencester, UK, December 20-22, 1999, Proceedings, pp. 185, 1999, Springer, 3-540-66887-X. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
19 | R. Reed Taylor, Seth Copen Goldstein |
A High-Performance Flexible Architecture for Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems, First International Workshop, CHES'99, Worcester, MA, USA, August 12-13, 1999, Proceedings, pp. 231-245, 1999, Springer, 3-540-66646-X. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #50 of 50 (100 per page; Change: )
|
|