Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
102 | Gaël Rouvroy, François-Xavier Standaert, Jean-Jacques Quisquater, Jean-Didier Legat |
Compact and Efficient Encryption/Decryption Module for FPGA Implementation of the AES Rijndael Very Well Suited for Small Embedded Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (2) ![In: International Conference on Information Technology: Coding and Computing (ITCC'04), Volume 2, April 5-7, 2004, Las Vegas, Nevada, USA, pp. 583-587, 2004, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
compact encryption/decryption implementation, FPGA, Cryptography, AES, DES |
93 | Peter Phuong Vo, Chau Maggie Vo |
FMS and FMSE encryption/decryption algorithms using flipping, mapping, and shifting operations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006, pp. 142-146, 2006, ACM, 1-59593-437-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
encryption/decryption using flipping, shifting operations, mapping |
73 | Vartika Singh, D. R. Lakshminarasimhaiah, Yogesh Mishra, Chitra Viswanathan, G. Athithan 0001 |
An Implementation and Evaluation of Online Disk Encryption for Windows Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings, pp. 337-348, 2006, Springer, 3-540-68962-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Disk encryption, Initialization vector, Storage data encryption/decryption and Sector-level encryption, Storage security |
66 | Rong-Jian Chen, Yi-Te Lai, Jui-Lin Lai |
Architecture design and VLSI hardware implementation of image encryption/decryption system using re-configurable 2D Von Neumann cellular automata. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS ![In: International Symposium on Circuits and Systems (ISCAS 2006), 21-24 May 2006, Island of Kos, Greece, 2006, IEEE, 0-7803-9389-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
63 | Shay Gueron |
Intel's New AES Instructions for Enhanced Performance and Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 16th International Workshop, FSE 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers, pp. 51-66, 2009, Springer, 978-3-642-03316-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
new instructions set, computer architecture, Advanced Encryption Standard |
62 | Charlie Obimbo, Behzad Salami 0002 |
A Parallel Algorithm for determining the inverse of a matrix for use in blockcipher encryption/decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Supercomput. ![In: J. Supercomput. 39(2), pp. 113-130, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Inverse of a matrix, Row-echelon reduction, Parallel Algorithms, Cryptography, Block Ciphers, Modular arithmetic, Systems of linear equations |
58 | Jen-Chieh Lai, Chia-Hui Wang |
Buffer Occupancy Feedback Security Control and Changing Encryption Keys to Protect MOD Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PSIVT ![In: Advances in Image and Video Technology, First Pacific Rim Symposium, PSIVT 2006, Hsinchu, Taiwan, December 10-13, 2006, Proceedings, pp. 888-897, 2006, Springer, 3-540-68297-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
encryption/decryption, playback buffer occupancy (PBO), feedback control, MOD |
54 | Ayman Alfalou, Alain Loussert, Abdulsalam Alkholidi, Rami El Sawda |
System for Image Compression and Encryption by Spectrum Fusion in Order to Optimize Image Transmission. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FGCN (2) ![In: Future Generation Communication and Networking, FGCN 2007, Ramada Plaza Jeju, Jeju-Island, Korea, December 6-8, 2007, Proceedings, pp. 590-593, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Signal and Image Processing, Image Compres- sion/Decompression, Image Encryption/Decryption, Trans- mission, FFT, DCT |
52 | David A. Barr |
Copy Protection for High-Definition Baseband Video. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC ![In: 2000 International Symposium on Information Technology (ITCC 2000), 27-29 March 2000, Las Vegas, NV, USA, pp. 174-177, 2000, IEEE Computer Society, 0-7695-0540-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
49 | Guido Bertoni, Luca Breveglieri, Israel Koren, Paolo Maistri, Vincenzo Piuri |
Error Analysis and Detection Procedures for a Hardware Implementation of the Advanced Encryption Standard. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 52(4), pp. 492-505, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
parity codes, fault tolerance, fault detection, Advanced Encryption Standard, AES |
39 | Eun-Jun Yoon, Kee-Young Yoo |
Token-Based Authenticated Key Establishment Protocols for Three-Party Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC Workshops ![In: Emerging Directions in Embedded and Ubiquitous Computing, EUC 2007 Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei, Taiwan, December 17-20, 2007, Proceedings, pp. 758-769, 2007, Springer, 978-3-540-77089-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Three-party, Authentication, Cryptography, Password, Key agreement, Token |
36 | Huizhang Shen, Jidi Zhao, Huanchen Wang |
Illegal Intrusion Detection Based on Hidden Information Database. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISI ![In: Intelligence and Security Informatics, International Workshop, WISI 2006, Singapore, April 9, 2006, Proceedings, pp. 79-84, 2006, Springer, 3-540-33361-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
36 | Guido Bertoni, Luca Breveglieri, Israel Koren, Paolo Maistri, Vincenzo Piuri |
A Parity Code Based Fault Detection for an Implementation of the Advanced Encryption Standard. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DFT ![In: 17th IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT 2002), 6-8 November 2002, Vancouver, BC, Canada, Proceedings, pp. 51-59, 2002, IEEE Computer Society, 0-7695-1831-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
34 | Keith M. Martin, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild |
Distributing the Encryption and Decryption of a Block Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 36(3), pp. 263-287, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
thereshold cryptography, block cipher, secret sharing, shared computation |
32 | Praveen R. Samala, Hamid Vakilzadian, Dietmar P. F. Möller |
Modeling and simulation of common primitive operations used in block ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCSC ![In: Proceedings of the 2007 Summer Computer Simulation Conference, SCSC 2007, San Diego, California, USA, July 16-19, 2007, pp. 732-737, 2007, Simulation Councils, Inc., 1-56555-316-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
discrete event simulation, hardware modeling, encryption algorithms |
32 | Shiuh-Jeng Wang, Hung Hsuan Chen, Pin-You Chen, Yuh-Ren Tsai |
Security Cryptanalysis in High-Order Improved Fast Encryption Algorithm for Multimedia. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FGCN (1) ![In: Future Generation Communication and Networking, FGCN 2007, Ramada Plaza Jeju, Jeju-Island, Korea, December 6-8, 2007, Proceedings, pp. 328-331, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Eike Kiltz |
Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings, pp. 282-297, 2007, Springer, 978-3-540-71676-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Jean-Sébastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen |
Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, Paris, France, February 12-14, 2002, Proceedings, pp. 17-33, 2002, Springer, 3-540-43168-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
31 | Jae-Pyo Park, Hong-jin Kim, Keun-Wang Lee, Keun-Soo Lee |
A PKI Based Digital Rights Management System for Safe Playback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIC (2) ![In: Advances in Intelligent Computing, International Conference on Intelligent Computing, ICIC 2005, Hefei, China, August 23-26, 2005, Proceedings, Part II, pp. 801-810, 2005, Springer, 3-540-28227-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
31 | Pawel Chodowiec, Kris Gaj, Peter Bellows, Brian Schott |
Experimental Testing of the Gigabit IPSec-Compliant Implementations of Rijndael and Triple DES Using SLAAC-1V FPGA Accelerator Board. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 4th International Conference, ISC 2001, Malaga, Spain, October 1-3, 2001, Proceedings, pp. 220-234, 2001, Springer, 3-540-42662-0. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
28 | Ahmet Can Mert, Erdinç Öztürk, Erkay Savas |
Design and Implementation of Encryption/Decryption Architectures for BFV Homomorphic Encryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Very Large Scale Integr. Syst. ![In: IEEE Trans. Very Large Scale Integr. Syst. 28(2), pp. 353-362, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Chitra Rajarama, Jagadeesha Narasimhamurthy Sugatoor, T. Yerri Swamy |
Diffie-Hellman Type Key Exchange, ElGamal Like Encryption/Decryption and Proxy Re-encryption Using Circulant Matrices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Netw. Secur. ![In: Int. J. Netw. Secur. 20(4), pp. 617-624, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
27 | Sherman S. M. Chow, Siu-Ming Yiu |
Timed-Release Encryption Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings, pp. 38-51, 2008, Springer, 978-3-540-88732-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
release-time confidentiality, Timed-release encryption |
27 | François-Xavier Standaert, Gilles Piret, Neil Gershenfeld, Jean-Jacques Quisquater |
SEA: A Scalable Encryption Algorithm for Small Embedded Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CARDIS ![In: Smart Card Research and Advanced Applications, 7th IFIP WG 8.8/11.2 International Conference, CARDIS 2006, Tarragona, Spain, April 19-21, 2006, Proceedings, pp. 222-236, 2006, Springer, 3-540-33311-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Istemi Ekin Akkus, Öznur Özkasap, M. Reha Civanlar |
Secure Transmission of Video on an End System Multicast Using Public Key Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MRCS ![In: Multimedia Content Representation, Classification and Security, International Workshop, MRCS 2006, Istanbul, Turkey, September 11-13, 2006, Proceedings, pp. 603-610, 2006, Springer, 3-540-39392-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Marius Marcu, Dacian Tudor, Sebastian Fuicu |
Power efficiency analysis of multimedia secured mobile applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, IWCMC 2010, Caen, France, June 28 - July 2, 2010, pp. 387-391, 2010, ACM, 978-1-4503-0062-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
encoding/decoding, encryption/decryption, mobile devices, energy efficiency, wireless communication, power consumption, multimedia applications |
27 | Pravin Revankar, W. Z. Gandhare, Dilip Rathod |
Neural Synchronization with Queries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSAP ![In: 2010 International Conference on Signal Acquisition and Processing, ICSAP 2010, Bangalore, India, February 9-10, 2010, pp. 371-374, 2010, IEEE Computer Society, 978-0-7695-3960-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Neural cryptography, mutual learning, tree parity machine, neural synchronization, encryption/decryption, neural network, query |
27 | Rajiv K. Nekkanti, Chung-wei Lee |
Trust based adaptive on demand ad hoc routing protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference ![In: Proceedings of the 42nd Annual Southeast Regional Conference, 2004, Huntsville, Alabama, USA, April 2-3, 2004, pp. 88-93, 2004, ACM, 1-58113-870-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
encryption/decryption, trust factor, AODV, security level, ad-hoc routing protocol |
27 | Lein Harn, David Huang |
A Protocol for Establishing Secure Communication Channels in a Large Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 6(1), pp. 188-191, 1994. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
secure communication channels, open media, large distributed network, data attack vulnerability, data encryption/decryption techniques, secret session key, locally trusted centers, public-key distribution, RSA encryption scheme, authentication, protocols, protocol, computer networks, public key cryptography, security of data, key distribution, information access, data storage, data transformation, telecommunication channels, multi-user system, knowledge exchange |
26 | Mabroka Ali Mayouf, Zarina Shukur |
Using Animation in Active Learning Tool to Detect Possible Attacks in Cryptographic Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IVIC ![In: Visual Informatics: Bridging Research and Practice, First International Visual Informatics Conference, IVIC 2009, Kuala Lumpur, Malaysia, November 11-13, 2009, Proceedings, pp. 510-520, 2009, Springer, 978-3-642-05035-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
possible attacks, animation, active learning, cryptographic protocols, visual metaphor |
26 | Sandip Dutta, Avijit Kar, N. C. Mahanti, B. N. Chatterji |
Network Security Using Biometric and Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIVS ![In: Advanced Concepts for Intelligent Vision Systems, 10th International Conference, ACIVS 2008, Juan-les-Pins, France, October 20-24, 2008. Proceedings, pp. 38-44, 2008, Springer, 978-3-540-88457-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Cryptography, Biometric, Watermarking, DES, MD5 |
26 | Ling Cheung, Calvin C. Newport |
Provably secure ciphertext policy ABE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007, pp. 456-465, 2007, ACM, 978-1-59593-703-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
access control, public key cryptography, attribute-based encryption |
26 | Ricardo Chaves, Georgi Kuzmanov, Stamatis Vassiliadis, Leonel Sousa |
Reconfigurable memory based AES co-processor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), Proceedings, 25-29 April 2006, Rhodes Island, Greece, 2006, IEEE. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Khaled Z. Ibrahim |
Efficient Architectural Support for Secure Bus-Based Shared Memory Multiprocessor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Asia-Pacific Computer Systems Architecture Conference ![In: Advances in Computer Systems Architecture, 10th Asia-Pacific Conference, ACSAC 2005, Singapore, October 24-26, 2005, Proceedings, pp. 640-654, 2005, Springer, 3-540-29643-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Jun-Hong Chen, Ming-Der Shieh, Chien-Ming Wu |
Concurrent algorithm for high-speed point multiplication in elliptic curve cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS (5) ![In: International Symposium on Circuits and Systems (ISCAS 2005), 23-26 May 2005, Kobe, Japan, pp. 5254-5257, 2005, IEEE, 0-7803-8834-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Qianhong Wu, Bo Qin, Changjie Wang, Xiaofeng Chen 0001, Yumin Wang |
t-Out-of-n String/Bit Oblivious Transfers Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings, pp. 410-421, 2005, Springer, 3-540-25584-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | François-Xavier Standaert, Gilles Piret, Gaël Rouvroy, Jean-Jacques Quisquater, Jean-Didier Legat |
ICEBERG : An Involutional Cipher Efficient for Block Encryption in Reconfigurable Hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 11th International Workshop, FSE 2004, Delhi, India, February 5-7, 2004, Revised Papers, pp. 279-299, 2004, Springer, 3-540-22171-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
block cipher design, side-channel resistance, reconfigurable hardware, efficient implementations |
26 | Seungjoo Kim, Masahiro Mambo, Yuliang Zheng 0001 |
Rethinking Chosen-Ciphertext Security under Kerckhoffs' Assumption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2003, The Cryptographers' Track at the RSA Conference 2003, San Francisco, CA, USA, April 13-17, 2003, Proceedings, pp. 227-243, 2003, Springer, 3-540-00847-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Kerckhoffs' assumption, provable security, chosen-ciphertext security |
26 | Jiande Zheng |
A New Public Key Cryptosystem for Constrained Hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 5th International Conference, ISC 2002 Sao Paulo, Brazil, September 30 - October 2, 2002, Proceedings, pp. 334-341, 2002, Springer, 3-540-44270-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
26 | Yukio Mitsuyama, Zaldy Andales, Takao Onoye, Isao Shirakawa |
A dynamically reconfigurable hardware-based cipher chip. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASP-DAC ![In: Proceedings of ASP-DAC 2001, Asia and South Pacific Design Automation Conference 2001, January 30-February 2, 2001, Yokohama, Japan, pp. 11-12, 2001, ACM, 0-7803-6634-4. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
26 | Yukio Mitsuyama, Zaldy Andales, Takao Onoye, Isao Shirakawa |
VLSI architecture of dynamically reconfigurable hardware-based cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS (4) ![In: Proceedings of the 2001 International Symposium on Circuits and Systems, ISCAS 2001, Sydney, Australia, May 6-9, 2001, pp. 734-737, 2001, IEEE, 0-7803-6685-9. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
23 | Anil Yekkala, C. E. Veni Madhavan |
Bit Domain Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIVS ![In: Advanced Concepts for Intelligent Vision Systems, 10th International Conference, ACIVS 2008, Juan-les-Pins, France, October 20-24, 2008. Proceedings, pp. 45-56, 2008, Springer, 978-3-540-88457-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Aslan Askarov, Daniel Hedin, Andrei Sabelfeld |
Cryptographically-Masked Flows. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAS ![In: Static Analysis, 13th International Symposium, SAS 2006, Seoul, Korea, August 29-31, 2006, Proceedings, pp. 353-369, 2006, Springer, 3-540-37756-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Rong-Jian Chen, Yi-Te Lai, Jui-Lin Lai |
Architecture design of the re-configurable 2-D von Neumann cellular automata for image encryption application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS (4) ![In: International Symposium on Circuits and Systems (ISCAS 2005), 23-26 May 2005, Kobe, Japan, pp. 3059-3062, 2005, IEEE, 0-7803-8834-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Gaël Rouvroy, François-Xavier Standaert, Jean-Jacques Quisquater, Jean-Didier Legat |
Efficient Uses of FPGAs for Implementations of DES and Its Experimental Linear Cryptanalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 52(4), pp. 473-482, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
FPGA, Cryptography, DES, linear cryptanalysis, efficient implementations |
23 | Yeong-Kang Lai, Yu-Chuan Shu |
VLSI architecture design and implementation for BLOWFISH block cipher with secure modes of operation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS (4) ![In: Proceedings of the 2001 International Symposium on Circuits and Systems, ISCAS 2001, Sydney, Australia, May 6-9, 2001, pp. 57-60, 2001, IEEE, 0-7803-6685-9. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
23 | Ronald Mraz |
Secure Blue: An Architecture for a Scalable, Reliable, High Volume SSL Internet Server. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 17th Annual Computer Security Applications Conference (ACSAC 2001), 11-14 December 2001, New Orleans, Louisiana, USA, pp. 391-398, 2001, IEEE Computer Society, 0-7695-1405-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
22 | Wei Chen 0091, Zidong Wang, Quanbo Ge, Hongli Dong, Guo-Ping Liu 0003 |
Quantized Distributed Economic Dispatch for Microgrids: Paillier Encryption-Decryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Ind. Informatics ![In: IEEE Trans. Ind. Informatics 20(4), pp. 6552-6562, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
22 | Bogang Qu, Zidong Wang, Bo Shen 0001, Hongli Dong, Xin Zhang 0028 |
Secure Particle Filtering With Paillier Encryption-Decryption Scheme: Application to Multi-Machine Power Grids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Smart Grid ![In: IEEE Trans. Smart Grid 15(1), pp. 863-873, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
22 | Xiang-Gui Guo, Bo-Qun Wang, Jian-Liang Wang, Choon Ki Ahn, Zheng-Guang Wu |
Edge-event-triggered encryption-decryption observer-based control of multiagent systems for privacy protection under multiple cyber attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Sci. ![In: Inf. Sci. 642, pp. 119128, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Lei Zou 0003, Zidong Wang, Bo Shen 0001, Hongli Dong |
Encryption-Decryption-Based State Estimation With Multirate Measurements Against Eavesdroppers: A Recursive Minimum-Variance Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Autom. Control. ![In: IEEE Trans. Autom. Control. 68(12), pp. 8111-8118, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Tongxiang Li, Zidong Wang, Lei Zou 0003, Bo Chen 0003, Li Yu 0001 |
A dynamic encryption-decryption scheme for replay attack detection in cyber-physical systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Autom. ![In: Autom. 151, pp. 110926, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Chen Gao, Zidong Wang, Xiao He 0001, Hongli Dong |
Fault-Tolerant Consensus Control for Multiagent Systems: An Encryption-Decryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Autom. Control. ![In: IEEE Trans. Autom. Control. 67(5), pp. 2560-2567, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Noor Sattar Noor, Dalal Abdulmohsin Hammood, Ali Al-Naji, Javaan S. Chahl |
A Fast Text-to-Image Encryption-Decryption Algorithm for Secure Network Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. ![In: Comput. 11(3), pp. 39, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | M. N. Sharada Guptha, M. N. Eshwarappa |
RL-BLED: A Reversible Logic Design of Bit Level Encryption/Decryption Algorithm for Secure Mammogram Data Transmission. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Pers. Commun. ![In: Wirel. Pers. Commun. 125(1), pp. 939-963, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Youngmo Kim, Byeongchan Park, Seok-Yoon Kim |
A Selective Encryption/Decryption Method of Sensitive Music Usage History Information on Theme, Background and Signal Music Blockchain Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Web Eng. ![In: J. Web Eng. 21(4), pp. 1265-1282, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Lili Zhou, Xiaohui Li, Fei Tan, Yi Huang, Weina Ma |
A two-layer networks-based audio encryption/decryption scheme via fixed-time cluster synchronization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Soft Comput. ![In: Soft Comput. 26(19), pp. 9761-9774, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Ahmed Maache, Anouar Touati, Ayoub Ouali |
Implementation of an AES-based real-time Video Encryption/Decryption using FPGA/HPS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSD ![In: 19th International Multi-Conference on Systems, Signals & Devices, SSD 2022, Sétif, Algeria, May 6-10, 2022, pp. 709-713, 2022, IEEE, 978-1-6654-7108-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Chen Gao, Zidong Wang, Xiao He 0001, Hongli Dong |
Encryption-decryption-based consensus control for multi-agent systems: Handling actuator faults. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Autom. ![In: Autom. 134, pp. 109908, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Xin Huang, David Arnold 0006, Tianyang Fang, Jafar Saniie |
A Chaotic-based Encryption/Decryption System for Secure Video Transmission. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EIT ![In: IEEE International Conference on Electro Information Technology, EIT 2021, Mt. Pleasant, MI, USA, May 14-15, 2021, pp. 369-373, 2021, IEEE, 978-1-6654-1846-1. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Amal Hafsa, Jihene Malek, Mohsen Machhout |
Performance trade-offs of hybrid cryptosystem for medical images encryption - decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSD ![In: 18th International Multi-Conference on Systems, Signals & Devices, SSD 2021, Monastir, Tunisia, March 22-25, 2021, pp. 1221-1229, 2021, IEEE, 978-1-6654-1493-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Xin Zheng 0001, Chongyao Xu, Xianghong Hu, Yun Zhang 0001, Xiaoming Xiong |
The Software/Hardware Co-Design and Implementation of SM2/3/4 Encryption/Decryption and Digital Signature System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. ![In: IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39(10), pp. 2055-2066, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Sakshi Patel, Bharath K. P, Rajesh Kumar Muthu |
Image Encryption Decryption Using Chaotic Logistic Mapping and DNA Encoding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2003.06616, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
22 | Ibrahim Yasser, Mohamed Azim Mohamed, Ahmed Shaban Samrah, Fahmi Khalifa |
A Chaotic-Based Encryption/Decryption Framework for Secure Multimedia Communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Entropy ![In: Entropy 22(11), pp. 1253, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
22 | P. Mathivanan, A. Balaji Ganesh, R. Venkatesan 0001 |
QR code-based ECG signal encryption/decryption algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptologia ![In: Cryptologia 43(3), pp. 233-253, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni 0001 |
Compact circuits for combined AES encryption/decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptogr. Eng. ![In: J. Cryptogr. Eng. 9(1), pp. 69-83, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Amjad Yosef Hendi, Majed O. Dwairi, Ziad Abdulkareem Al-Qadi, Mohamed S. Soliman |
A NOVEL SIMPLE AND HIGHLY SECURE METHOD FOR DATA ENCRYPTION-DECRYPTION. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Commun. Networks Inf. Secur. ![In: Int. J. Commun. Networks Inf. Secur. 11(1), 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
22 | Kevin Herman Muraro Gularte, Luíza F. Q. Martins, José Alfredo Ruiz Vargas, João Paulo A. Maranhão, Willian A. M. Gabalan, Jesus Franklin Andrade Romero |
A Scheme for Encryption/Decryption based on Hyperchaotic Systems and Lyapunov Theory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSPCS ![In: 13th International Conference on Signal Processing and Communication Systems, ICSPCS 2019, Gold Coast, Australia, December 16-18, 2019, pp. 1-9, 2019, IEEE, 978-1-7281-2194-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Harshad R. Pawar, Dinesh G. Harkut |
Classical and Quantum Cryptography for Image Encryption & Decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RICE ![In: Proceedings of the 2018 IEEE International Conference on Research in Intelligent and Computing in Engineering, RICE 2018, San Salvador, El Salvador, August 22-24, 2018, pp. 1-4, 2018, IEEE, 978-1-5386-2599-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Magdy Ibrahim ElSharkawy |
Quaternion-based Encryption/Decryption of Audio Signal Using Digital Image as Variable Key. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Commun. Networks Inf. Secur. ![In: Int. J. Commun. Networks Inf. Secur. 9(2), 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
22 | Lijuan Li 0002, Shuguo Li |
High throughput AES encryption/decryption with efficient reordering and merging techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPL ![In: 27th International Conference on Field Programmable Logic and Applications, FPL 2017, Ghent, Belgium, September 4-8, 2017, pp. 1-4, 2017, IEEE, 978-9-0903-0428-1. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Dur-e-Shahwar Kundi, Arshad Aziz, Nassar Ikram |
A high performance ST-Box based unified AES encryption/decryption architecture on FPGA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Microprocess. Microsystems ![In: Microprocess. Microsystems 41, pp. 37-46, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
22 | Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni 0001 |
Atomic-AES: A Compact Implementation of the AES Encryption/Decryption Core. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2016, pp. 927, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
22 | Colleen Heinemann, Sai Shankar Chaduvu, Adam Byerly, Alexander Uskov |
OpenCL and CUDA software implementations of encryption/decryption algorithms for IPsec VPNs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EIT ![In: 2016 IEEE International Conference on Electro Information Technology, EIT 2016, Grand Forks, ND, USA, May 19-21, 2016, pp. 765-770, 2016, IEEE, 978-1-4673-9985-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
22 | Yi Wang 0016, Yajun Ha |
High throughput and resource efficient AES encryption/decryption for SANs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS ![In: IEEE International Symposium on Circuits and Systems, ISCAS 2016, Montréal, QC, Canada, May 22-25, 2016, pp. 1166-1169, 2016, IEEE, 978-1-4799-5341-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
22 | Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni 0001 |
Atomic-AES: A Compact Implementation of the AES Encryption/Decryption Core. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2016 - 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings, pp. 173-190, 2016, 978-3-319-49889-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
22 | Rodica-Mihaela Teodorescu, Ioan Lita, Ion Bogdan Cioc, Daniel Alexandru Visan |
Virtual instrumentation application for symmetrical and asymmetrical text encryption/decryption studying. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECAI ![In: 2015 7th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), Bucharest, Romania, June 25-27, 2015, 2015, IEEE, 978-1-4673-6646-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
22 | Yixin Liu, Haipeng Zhang, Tao Feng |
Design of an Encryption-Decryption Module Oriented for Internet Information Security SOC Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1401.6375, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
22 | Prakash Kuppuswamy, Saeed Q. Y. Al-Khalidi |
Hybrid encryption/decryption technique using new public key and symmetric key algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Comput. Secur. ![In: Int. J. Inf. Comput. Secur. 6(4), pp. 372-382, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
22 | Xianhua Song, Xiamu Niu |
Comment on: Novel image encryption/decryption based on quantum fourier transform and double phase encoding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Quantum Inf. Process. ![In: Quantum Inf. Process. 13(6), pp. 1301-1304, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
22 | Xu Bai, Lei Jiang 0003, Xinxing Liu, Jianlong Tan |
RSA Encryption/Decryption Implementation Based on Zedboard. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCTCS ![In: Trustworthy Computing and Services - International Conference, ISCTCS 2014, Beijing, China, November 28-29, 2014, Revised Selected Papers, pp. 114-121, 2014, Springer, 978-3-662-47400-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
22 | Ye Yan, Tao Shu |
Energy-efficient In-network encryption/decryption for wireless body area sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GLOBECOM ![In: IEEE Global Communications Conference, GLOBECOM 2014, Austin, TX, USA, December 8-12, 2014, pp. 2442-2447, 2014, IEEE, 978-1-4799-3512-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
22 | Yi Wang 0016, Akash Kumar 0001, Yajun Ha |
FPGA-based high throughput XTS-AES encryption/decryption for storage area network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPT ![In: 2014 International Conference on Field-Programmable Technology, FPT 2014, Shanghai, China, December 10-12, 2014, pp. 268-271, 2014, IEEE, 978-1-4799-6245-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
22 | Yu-Guang Yang 0001, Juan Xia, Xin Jia, Hua Zhang |
Novel image encryption/decryption based on quantum Fourier transform and double phase encoding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Quantum Inf. Process. ![In: Quantum Inf. Process. 12(11), pp. 3477-3493, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
22 | Nooshin Bigdeli 0001, Yousef Farid, Karim Afshar |
A novel image encryption/decryption scheme based on chaotic neural networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Eng. Appl. Artif. Intell. ![In: Eng. Appl. Artif. Intell. 25(4), pp. 753-765, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
22 | Boris S. Verkhovsky |
Double-Moduli Gaussian Encryption/Decryption with Primary Residues and Secret Controls. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Commun. Netw. Syst. Sci. ![In: Int. J. Commun. Netw. Syst. Sci. 4(7), pp. 475-481, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
22 | Gerassimos D. Barlas, Ahmed Hassan, Yasser Al Jundi |
An Analytical Approach to the Design of Parallel Block Cipher Encryption/Decryption: A CPU/GPU Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDP ![In: Proceedings of the 19th International Euromicro Conference on Parallel, Distributed and Network-based Processing, PDP 2011, Ayia Napa, Cyprus, 9-11 February 2011, pp. 247-251, 2011, IEEE Computer Society, 978-0-7695-4328-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
22 | Anil Hingmire, D. R. Ingle, Rahul Ambekar |
A new data encryption & decryption algorithm (PSZ proposal): a comparison with RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWET ![In: Proceedings of the ICWET '11 International Conference & Workshop on Emerging Trends in Technology, Mumbai, Maharashtra, India, February 25 - 26, 2011, pp. 1366, 2011, ACM, 978-1-4503-0449-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
22 | D. Ganotra, S. S. Mantha, A. Vinaya Babu |
Encryption decryption algorithm for m-commerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWET ![In: Proceedings of the ICWET '11 International Conference & Workshop on Emerging Trends in Technology, Mumbai, Maharashtra, India, February 25 - 26, 2011, pp. 218-219, 2011, ACM, 978-1-4503-0449-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
22 | Kuo-Ching Liu, Hui-Feng Huang |
A New Design of Encryption/Decryption for Field Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Convergence Inf. Technol. ![In: J. Convergence Inf. Technol. 5(5), pp. 39-43, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
22 | P. Karthigaikumar, K. Baskaran |
Partially Pipelined VLSI Implementation of Blowfish Encryption/Decryption Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Image Graph. ![In: Int. J. Image Graph. 10(3), pp. 327-341, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
22 | Vasily Dolmatov |
GOST 28147-89: Encryption, Decryption, and Message Authentication Code (MAC) Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 5830, pp. 1-19, March 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
22 | Rajaram Ramasamy, Amutha Prabakar Muniyandi, M. Indra Devi |
A new algorithm for encryption/decryption for field applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Stand. Interfaces ![In: Comput. Stand. Interfaces 31(6), pp. 1069-1072, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Weiping Zhang 0003, Wenyuan Chen, Jian Tang, Peng Xu, Yibin Li, Shengyong Li |
The Development of a Portable Hard Disk Encryption/Decryption System with a MEMS Coded Lock. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 9(11), pp. 9300-9331, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Jesús Lázaro 0001, Armando Astarloa, Unai Bidarte, Jaime Jimenez, Aitzol Zuloaga |
AES-Galois Counter Mode Encryption/Decryption FPGA Core for Industrial and Residential Gigabit Ethernet Communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARC ![In: Reconfigurable Computing: Architectures, Tools and Applications, 5th International Workshop, ARC 2009, Karlsruhe, Germany, March 16-18, 2009. Proceedings, pp. 312-317, 2009, Springer, 978-3-642-00640-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Kuo-Huang Chang, Yi-Cheng Chen, Chung-Cheng Hsieh |
Live Demonstration: Embedded a Low Area 32-bit AES for Image Encryption/Decryption Application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS ![In: International Symposium on Circuits and Systems (ISCAS 2009), 24-17 May 2009, Taipei, Taiwan, pp. 1926, 2009, IEEE, 978-1-4244-3827-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Kuo-Huang Chang, Yi-Cheng Chen, Chung-Cheng Hsieh, Chi-Wu Huang, Chi-Jeng Chang |
Embedded a Low Area 32-bit AES for Image Encryption/decryption Application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS ![In: International Symposium on Circuits and Systems (ISCAS 2009), 24-17 May 2009, Taipei, Taiwan, pp. 1922-1925, 2009, IEEE, 978-1-4244-3827-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Chayan Dutta, Thakar Lalitkrushna, Annie Nelson, S. R. Nagaraj, P. Lakshminarasimhan |
A New Encryption-Decryption Scheme that Solves Key Management Problem in Remote Sensing Satellite. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICETET ![In: First International Conference on Emerging Trends in Engineering and Technology, ICETET '08, Nagpur, Maharashtra, India, July 16-18, 2008, pp. 1261-1266, 2008, IEEE Computer Society, 978-0-7695-3267-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Mark White, Tai-Chi Lee, Michael Gubody |
Blowfish Encryption/Decryption Using FPGA and Custom Instructions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDPTA ![In: Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, PDPTA 2008, Las Vegas, Nevada, USA, July 14-17, 2008, 2 Volumes, pp. 164-169, 2008, CSREA Press, 1-60132-084-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
22 | Robert Sliz, Min-Yung Chang, Min-Jui Huang |
Secure Encryption, Decryption and Internet-based Transfer of the Binary Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iiWAS ![In: iiWAS'2007 - The Ninth International Conference on Information Integration and Web-based Applications Services, 3-5 December 2007, Jakarta, Indonesia, pp. 79-88, 2007, Austrian Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|