The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for aes with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1987-1999 (21) 2000 (46) 2001 (27) 2002 (53) 2003 (70) 2004 (95) 2005 (93) 2006 (119) 2007 (131) 2008 (147) 2009 (131) 2010 (108) 2011 (132) 2012 (97) 2013 (117) 2014 (133) 2015 (106) 2016 (107) 2017 (140) 2018 (131) 2019 (132) 2020 (134) 2021 (109) 2022 (135) 2023 (117) 2024 (34)
Publication types (Num. hits)
article(965) book(2) incollection(10) inproceedings(1674) phdthesis(9) proceedings(5)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1145 occurrences of 417 keywords

Results
Found 2665 publication records. Showing 2665 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
149Shay Gueron Intel's New AES Instructions for Enhanced Performance and Security. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF new instructions set, computer architecture, Advanced Encryption Standard
146Jianyong Huang, Jennifer Seberry, Willy Susilo A Five-Round Algebraic Property of the Advanced Encryption Standard. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF A Five-Round Algebraic Property of the AES, Algorithm ?, Variants of Algorithm ?, ?AES, AES, Linear Equations
121Tri Van Le, Rüdiger Sparr, Ralph Wernsdorf, Yvo Desmedt Complementation-Like and Cyclic Properties of AES Round Functions. Search on Bibsonomy AES Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF cyclic properties, AES, invariance, Rijndael, self-duality
117Jongsung Kim, Seokhie Hong, Bart Preneel Related-Key Rectangle Attacks on Reduced AES-192 and AES-256. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Cryptanalysis, Block Ciphers, AES, Related-Key Rectangle Attack
110Yongzhuang Wei, YuPu Hu New related-key rectangle attacks on reduced AES-192 and AES-256. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF block cipher, Advanced Encryption Standard, time complexity, related-key rectangle attack
104Liam Keliher Refined Analysis of Bounds Related to Linear and Differential Cryptanalysis for the AES. Search on Bibsonomy AES Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF SPN, MELP, MEDP, KMT2, KMT2-DC, AES, provable security, differential cryptanalysis, Rijndael, linear cryptanalysis
100Nicolas T. Courtois The Inverse S-Box, Non-linear Polynomial Relations and Cryptanalysis of Block Ciphers. Search on Bibsonomy AES Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF interpolation attack on block ciphers, fractional transformations, homographic functions, generalised linear cryptanalysis, bi-linear cryptanalysis, Block ciphers, AES, Rijndael, Feistel ciphers, multivariate equations
96Jean Monnerat, Serge Vaudenay On Some Weak Extensions of AES and BES. Search on Bibsonomy ICICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF AES, Rijndael, BES
96Johannes Blömer, Jean-Pierre Seifert Fault Based Cryptanalysis of the Advanced Encryption Standard (AES). Search on Bibsonomy Financial Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Secure Banking, Smart Cards, AES, Fault Attacks, Implementation Issues
94Norbert Pramstaller, Stefan Mangard, Sandra Dominikus, Johannes Wolkerstorfer Efficient AES Implementations on ASICs and FPGAs. Search on Bibsonomy AES Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF FPGA, Advanced Encryption Standard (AES), ASIC
89Frederik Armknecht, Stefan Lucks Linearity of the AES Key Schedule. Search on Bibsonomy AES Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
89Christophe Giraud 0001 DFA on AES. Search on Bibsonomy AES Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
89Alex Biryukov The Boomerang Attack on 5 and 6-Round Reduced AES. Search on Bibsonomy AES Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
87Sean Murphy, Matthew J. B. Robshaw Essential Algebraic Structure within the AES. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF (Finite) Galois Field, (Field) Conjugate, Multivariate Quadratic (MQ) Equations, Advanced Encryption Standard, AES, Rijndael, Algebraic Structure, BES
81Yohei Hori, Akashi Satoh, Hirofumi Sakane, Kenji Toda Bitstream encryption and authentication with AES-GCM in dynamically reconfigurable systems. Search on Bibsonomy FPL The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
81Daniel J. Bernstein The Poly1305-AES Message-Authentication Code. Search on Bibsonomy FSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
80Marine Minier A Three Rounds Property of the AES. Search on Bibsonomy AES Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
80Hans Dobbertin, Lars R. Knudsen, Matthew J. B. Robshaw The Cryptanalysis of the AES - A Brief Survey. Search on Bibsonomy AES Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
79Peter Hellekalek, Stefan Wegenkittl Empirical evidence concerning AES. Search on Bibsonomy ACM Trans. Model. Comput. Simul. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF block ciphers, AES, diffusion, statistical tests, confusion
78Gang Zhou, Harald Michalik, László Hinsenkamp Improving Throughput of AES-GCM with Pipelined Karatsuba Multipliers on FPGAs. Search on Bibsonomy ARC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF AES-GCM, pipelined Karatsuba multiplier, FPGAs, finite field arithmetic
78Alireza Hodjat, Ingrid Verbauwhede Area-Throughput Trade-Offs for Fully Pipelined 30 to 70 Gbits/s AES Processors. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2006 DBLP  DOI  BibTeX  RDF crypto-processor, security, VLSI, cryptography, Advanced Encryption Standard (AES), ASIC, hardware architectures
77Jun Zhang 0004, Jeffrey G. Andrews Distributed Antenna Systems with Randomness. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
76Joan Daemen, Mario Lamberger, Norbert Pramstaller, Vincent Rijmen, Frederik Vercauteren Computational aspects of the expected differential probability of 4-round AES and AES-like ciphers. Search on Bibsonomy Computing The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Mathematics Subject Classification (2000) 94A60, 11T71
76Chong Hee Kim, Jean-Jacques Quisquater New Differential Fault Analysis on AES Key Schedule: Two Faults Are Enough. Search on Bibsonomy CARDIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF AES key schedule, AES, Fault attack, DFA, Differential Fault Analysis
75Nicolas T. Courtois General Principles of Algebraic Attacks and New Design Criteria for Cipher Components. Search on Bibsonomy AES Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF polynomial relations, design of cryptographic primitives, generalised linear cryptanalysis, multivariate public key encryption and signature schemes, Quartz, combiners with memory, elimination methods, Gröbner bases, Boolean functions, stream ciphers, block ciphers, AES, finite fields, algebraic attacks, Rijndael, Serpent, HFE, Sflash, multivariate equations
72Ryad Benadjila, Olivier Billet, Shay Gueron, Matthew J. B. Robshaw The Intel AES Instructions Set and the SHA-3 Candidates. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
72Xin-jie Zhao 0001, Tao Wang 0008, Dong Mi, Yuanyuan Zheng, Zhaoyang Lun Robust First Two Rounds Access Driven Cache Timing Attack on AES. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
72Ricardo Chaves, Georgi Kuzmanov, Stamatis Vassiliadis, Leonel Sousa Reconfigurable memory based AES co-processor. Search on Bibsonomy IPDPS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
72Elena Trichina, Tymur Korkishko, Kyung-Hee Lee Small Size, Low Power, Side Channel-Immune AES Coprocessor: Design and Synthesis Results. Search on Bibsonomy AES Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
70Ewan Fleischmann, Michael Gorski, Stefan Lucks Attacking 9 and 10 Rounds of AES-256. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF related-key boomerang attack, block ciphers, AES, differential cryptanalysis
70Hüseyin Demirci, Ihsan Taskin, Mustafa Çoban, Adnan Baysal Improved Meet-in-the-Middle Attacks on AES. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cryptanalysis, AES, Rijndael, meet-in-the-middle attack
70Alex Biryukov, Dmitry Khovratovich, Ivica Nikolic Distinguisher and Related-Key Attack on the Full AES-256. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF chosen key distinguisher, Davies-Meyer, ideal cipher, AES, related-key attack
70Andrey Bogdanov Improved Side-Channel Collision Attacks on AES. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF generalized collisions, AES, side-channel attacks, random graphs, connected components, collision attacks
70Wentao Zhang, Wenling Wu, Dengguo Feng New Results on Impossible Differential Cryptanalysis of Reduced AES. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cryptanalysis, AES, impossible differentials
70Amir Moradi 0001, Mohammad T. Manzuri Shalmani, Mahmoud Salmasizadeh A Generalized Method of Differential Fault Attack Against AES Cryptosystem. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cryptanalysis, Smart Card, AES, Side Channel Attacks, Fault Attacks
70Joseph Bonneau, Ilya Mironov Cache-Collision Timing Attacks Against AES. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cache, cryptanalysis, AES, side-channel attack, timing attack
70Stefan Mangard, Kai Schramm Pinpointing the Side-Channel Leakage of Masked AES Hardware Implementations. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Zero-Offset DPA, Zero-Input DPA, Delay Chains, AES, DPA, Masking, Glitches
70Olivier Billet, Henri Gilbert, Charaf Ech-Chatbi Cryptanalysis of a White Box AES Implementation. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF white box, implementation, block ciphers, AES, tamper resistance, software piracy
70Dino Oliva, Rainer Buchty, Nevin Heintze AES and the cryptonite crypto processor. Search on Bibsonomy CASES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF round key generation, architecture, cryptography, AES, processor, high-speed, software implementation, high-bandwidth
70Stefan Mangard A Simple Power-Analysis (SPA) Attack on Implementations of the AES Key Expansion. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Key Expansion, Smart Cards, AES, Power Analysis, SPA, Key Scheduling
69Nancy Samaan Achieving Self-management in a Distributed System of Autonomic BUT Social Entities. Search on Bibsonomy MACE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF interdependent utilities, Autonomic computing, utility functions
69Chih-Hsu Yen, Bing-Fei Wu Simple Error Detection Methods for Hardware Implementation of Advanced Encryption Standard. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2006 DBLP  DOI  BibTeX  RDF differential fault attacks, Advanced encryption standard, error control code, CRC
68Håvard Raddum More Dual Rijndaels. Search on Bibsonomy AES Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
68Carlos Cid Some Algebraic Aspects of the Advanced Encryption Standard. Search on Bibsonomy AES Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
67Mun-Kyu Lee, Jung Ki Min, Seok Hun Kang, Sang-Hwa Chung, Howon Kim 0001, Dong Kyue Kim Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection Protocols. Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF electronic seal, RFID, AES, message authentication code, pseudorandom function
65Alex Biryukov, Dmitry Khovratovich Related-Key Cryptanalysis of the Full AES-192 and AES-256. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF AES, related-key attack, boomerang attack
64Shee-Yau Wu, Shih-Chuan Lu, Chi-Sung Laih Design of AES Based on Dual Cipher and Composite Field. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
63Ilia Toli, Alberto Zanoni An Algebraic Interpretation of AES-128. Search on Bibsonomy AES Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
62Flavius Opritoiu, Mircea Vladutiu, Lucian Prodan, Mihai Udrescu A high-speed AES architecture implementation. Search on Bibsonomy Conf. Computing Frontiers The full citation details ... 2010 DBLP  DOI  BibTeX  RDF cryptochip, optimization, fpga, hardware, aes
62Hüseyin Demirci, Ali Aydin Selçuk A Meet-in-the-Middle Attack on 8-Round AES. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF meet-in-the-middle cryptanalysis, square attack, AES, Rijndael
62Jörn-Marc Schmidt, Chong Hee Kim A Probing Attack on AES. Search on Bibsonomy WISA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Probing Attack, Smart Card, AES
62Jiqiang Lu, Orr Dunkelman, Nathan Keller, Jongsung Kim New Impossible Differential Attacks on AES. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF AES, Impossible differential cryptanalysis
62Michael Gorski, Stefan Lucks New Related-Key Boomerang Attacks on AES. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF related-key boomerang attack, block ciphers, AES, differential cryptanalysis
62Wentao Zhang, Lei Zhang 0012, Wenling Wu, Dengguo Feng Related-Key Differential-Linear Attacks on Reduced AES-192. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF related-key, differential-linear attack, cryptanalysis, AES
62Adam J. Elbirt Fast and Efficient Implementation of AES via Instruction Set Extensions. Search on Bibsonomy AINA Workshops (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cryptography, block cipher, AES, Galois Field
62Wentao Zhang, Wenling Wu, Lei Zhang 0012, Dengguo Feng Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF related-key differentials, cryptanalysis, AES, impossible differentials
62Kazuhiko Minematsu, Yukiyasu Tsunoo Provably Secure MACs from Differentially-Uniform Permutations and AES-Based Implementations. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Differentially-uniform permutation, MAC, Block cipher, AES
62Eli Biham, Orr Dunkelman, Nathan Keller Related-Key Impossible Differential Attacks on 8-Round AES-192. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF related-key differentials, AES, impossible differentials
62Kai Schramm, Christof Paar Higher Order Masking of the AES. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Higher Order DPA, Masking Countermeasure, AES
62Jakob Jonsson, Matthew J. B. Robshaw Securing RSA-KEM via the AES. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF RSA-KEM, key derivation function, AES
62Siddika Berna Örs, Frank K. Gürkaynak, Elisabeth Oswald, Bart Preneel Power-Analysis Attack on an ASIC AES implementation. Search on Bibsonomy ITCC (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF AES, power analysis attack
62Kai Schramm, Gregor Leander, Patrick Felke, Christof Paar A Collision-Attack on AES: Combining Side Channel- and Differential-Attack. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF internal collisions, AES, side channel attacks, birthday paradox
62Chien-Ning Chen, Sung-Ming Yen Differential Fault Analysis on AES Key Schedule and Some Coutnermeasures. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Differential fault analysis (DFA), Smart cards, AES, Rijndael, Physical cryptanalysis
62Gilles Piret, Jean-Jacques Quisquater A Differential Fault Attack Technique against SPN Structures, with Application to the AES and KHAZAD. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Block Ciphers, AES, Side-channel Attacks, Fault Attacks
61Kimmo U. Järvinen, Matti Tommiska, Jorma Skyttä A fully pipelined memoryless 17.8 Gbps AES-128 encryptor. Search on Bibsonomy FPGA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF FPGA, pipelining, advanced encryption standard (AES)
61Christopher Caltagirone, Kasi Anantha High throughput, parallelized 128-bit AES encryption in a resource-limited FPGA. Search on Bibsonomy SPAA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF 128-bit AES, optimization, FPGA, parallelization, hardware, high-throughput
60Jie Chen 0055, YuPu Hu, Yueyu Zhang Impossible differential cryptanalysis of Advanced Encryption Standard. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cryptanalysis, block cipher, advanced encryption standard, impossible differential cryptanalysis
58Mitsuru Matsui, Junko Nakajima On the Power of Bitslice Implementation on Intel Core2 Processor. Search on Bibsonomy CHES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Fast Software Encryption, Bitslice, KASUMI, Core2, AES
55Akashi Satoh, Takeshi Sugawara 0001, Naofumi Homma, Takafumi Aoki High-Performance Concurrent Error Detection Scheme for AES Hardware. Search on Bibsonomy CHES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
55Vitalij Ocheretnij, G. Kouznetsov, Ramesh Karri, Michael Gössel On-Line Error Detection and BIST for the AES Encryption Algorithm with Different S-Box Implementations. Search on Bibsonomy IOLTS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
55Jingmei Liu, Baodian Wei, Xiangguo Cheng, Xinmei Wang An AES S-Box to Increase Complexity and Cryptographic Analysis. Search on Bibsonomy AINA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
55Chih-Chung Lu, Shau-Yin Tseng Integrated Design of AES (Advanced Encryption Standard) Encrypter and Decrypter. Search on Bibsonomy ASAP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
55Lars R. Knudsen Advanced Encryption Standard (AES) - An Update. Search on Bibsonomy IMACC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
53Alex Tsow An Improved Recovery Algorithm for Decayed AES Key Schedule Images. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF anti-tamper, decayed memory, cold-boot attack, AES, digital forensics, key schedule
53Mike Hamburg Accelerating AES with Vector Permute Instructions. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SSSE3, vector permute, cache-timing attacks, AES, fast implementations, composite fields, AltiVec
53Svetla Nikova, Vincent Rijmen, Martin Schläffer Using Normal Bases for Compact Hardware Implementations of the AES S-Box. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF AES, hardware implementation, S-box, normal basis
53Monjur Alam, Santosh Ghosh, Dipanwita Roy Chowdhury, Indranil Sengupta 0001 Single Chip Encryptor/Decryptor Core Implementation of AES Algorithm. Search on Bibsonomy VLSI Design The full citation details ... 2008 DBLP  DOI  BibTeX  RDF AES, Reconfigurable Architecture, S- box, Rijndael, Composite fields
53Shammi Didla, Aaron Ault, Saurabh Bagchi Optimizing AES for embedded devices and wireless sensor networks. Search on Bibsonomy TRIDENTCOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF CC2420, Zigbee security, embedded optimizations, secure sensor networks, encryption, AES, MSP430
53Babak Zakeri, Mahmoud Salmasizadeh, Amir Moradi 0001, Mahmoud Tabandeh, Mohammad T. Manzuri Shalmani Compact and Secure Design of Masked AES S-Box. Search on Bibsonomy ICICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Composite field arithmetic, AES, Side-Channel Attack, Masking
53Christoph Herbst, Elisabeth Oswald, Stefan Mangard An AES Smart Card Implementation Resistant to Power Analysis Attacks. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF DPA resistance, smart card, AES
53Johannes Buchmann 0001, Andrei Pyshkin, Ralf-Philipp Weinmann A Zero-Dimensional Gröbner Basis for AES-128. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Gröbner bases, block ciphers, AES, Rijndael
53Guido Bertoni, Vittorio Zaccaria, Luca Breveglieri, Matteo Monchiero, Gianluca Palermo AES Power Attack Based on Induced Cache Miss and Countermeasure. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Cache, Block Cipher, AES, Power Analysis, Cache Miss
53Jovan Dj. Golic, Christophe Tymen Multiplicative Masking and Power Analysis of AES. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF multiplicative masking, AES, differential power analysis, countermeasures
52Stefan Tillich, Martin Feldhofer, Thomas Popp, Johann Großschädl Area, Delay, and Power Characteristics of Standard-Cell Implementations of the AES S-Box. Search on Bibsonomy J. Signal Process. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF substitution box (S-box), inversion in the finite field GF($28$), standard cell implementation, Advanced Encryption Standard (AES), power consumption, silicon area, critical path delay
52Zhenglin Liu, Xu Guo, Yi-Cheng Chen, Yu Han, Xuecheng Zou On the Ability of AES S-Boxes to Secure Against Correlation Power Analysis. Search on Bibsonomy ISPEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF correlation power analysis (CPA), Advanced Encryption Standard (AES), hamming distance, correlation coefficient
52Hui Qin, Tsutomu Sasao, Yukihiro Iguchi An FPGA design of AES encryption circuit with 128-bit keys. Search on Bibsonomy ACM Great Lakes Symposium on VLSI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF AES encryption, FPGA, pipeline
52Martin Feldhofer, Sandra Dominikus, Johannes Wolkerstorfer Strong Authentication for RFID Systems Using the AES Algorithm. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF symmetric challenge-response, Radio frequency identification (RFID), low-power design, Advanced Encryption Standard (AES)
51Goce Jakimoski, K. P. Subbalakshmi On Efficient Message Authentication Via Block Cipher Design Techniques. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Wegman-Carter construction, maximum differential probability, block ciphers, Message authentication, universal hash functions
51Guido Bertoni, A. Bircan, Luca Breveglieri, Pasqualina Fragneto, Marco Macchetti, Vittorio Zaccaria About the performances of the Advanced Encryption Standard in embedded systems with cache memory. Search on Bibsonomy ISCAS (5) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
51Hans Dobbertin, Vincent Rijmen, Aleksandra Sowa (eds.) Advanced Encryption Standard - AES, 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papers Search on Bibsonomy AES Conference The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
51Vincent Rijmen, Elisabeth Oswald Representations and Rijndael Descriptions. Search on Bibsonomy AES Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
51Thomas J. Wollinger, Min Wang, Jorge Guajardo, Christof Paar How Well Are High-End DSPs Suited for the AES Algorithms? AES Algorithms on the TMS320C6x DSP. Search on Bibsonomy AES Candidate Conference The full citation details ... 2000 DBLP  BibTeX  RDF
50Jude Angelo Ambrose, Sri Parameswaran, Aleksandar Ignjatovic MUTE-AES: a multiprocessor architecture to prevent power analysis based side channel attack of the AES algorithm. Search on Bibsonomy ICCAD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
49Chu-Wee Lim, Khoongming Khoo An Analysis of XSL Applied to BES. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF XSL algorithm, AES, linearisation, BES
49Carlos Cid, Gaëtan Leurent An Analysis of the XSL Algorithm. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF XSL algorithm, T? method, AES, Linearization
49Guido Bertoni, Luca Breveglieri, Israel Koren, Paolo Maistri, Vincenzo Piuri Error Analysis and Detection Procedures for a Hardware Implementation of the Advanced Encryption Standard. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2003 DBLP  DOI  BibTeX  RDF parity codes, fault tolerance, fault detection, Advanced Encryption Standard, AES
47Wen-Ai Jackson, S. Murphy Projective aspects of the AES inversion. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF 51E15, AMS Classifications 94A60
47Abdul Samiah, Arshad Aziz, Nassar Ikram An Efficient Software Implementation of AES-CCM for IEEE 802.11i Wireless St. Search on Bibsonomy COMPSAC (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
47Junko Takahashi, Toshinori Fukunaga, Kimihiro Yamakoshi DFA Mechanism on the AES Key Schedule. Search on Bibsonomy FDTC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
47Dyi-Rong Duh, Tsung-Chi Lin, Chi-Ho Tung, Shin-Jie Chan An Implementation of AES Algorithm with the Multiple Spaces Random Key Pre-Distribution Scheme on MOTE-KIT 5040. Search on Bibsonomy SUTC (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 2665 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license