Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
32 | Nele Mentens, Lejla Batina, Bart Preneel, Ingrid Verbauwhede |
A Systematic Evaluation of Compact Hardware Implementations for the Rijndael S-Box. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2005, The Cryptographers' Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings, pp. 323-333, 2005, Springer, 3-540-24399-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
inversion in GF(2n), smart card implementation, AES, S-box, composite fields |
32 | Jorge Nakahara Jr., Daniel Santana de Freitas |
Cryptanalysis of Ake98. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2004, 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings, pp. 206-217, 2004, Springer, 3-540-24130-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Akelarre, Ake98, RC5, cryptanalysis, AES, IDEA, RC6 |
32 | Jakob Jonsson |
On the Security of CTR + CBC-MAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 9th Annual International Workshop, SAC 2002, St. John's, Newfoundland, Canada, August 15-16, 2002. Revised Papers, pp. 76-93, 2002, Springer, 3-540-00622-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
AES, modes of operation, authenticated encryption |
32 | Baodian Wei, Dongsu Liu, Xinmei Wang |
The General Autocorrelation and Its Application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CW ![In: 1st International Symposium on Cyber Worlds (CW 2002), 6-8 November 2002, Tokyo, Japan, pp. 267-276, 2002, IEEE Computer Society, 0-7695-1862-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Strict avalanche criterion, Propagation Criterion, Boolean function, AES, Autocorrelation, Linear structure |
32 | Máire McLoone, John V. McCanny |
Single-Chip FPGA Implementation of the Advanced Encryption Standard Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPL ![In: Field-Programmable Logic and Applications, 11th International Conference, FPL 2001, Belfast, Northern Ireland, UK, August 27-29, 2001, Proceedings, pp. 152-161, 2001, Springer, 3-540-42499-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Encryption, AES, Rijndael, FPGA Implementation |
32 | Louis Goubin |
A Sound Method for Switching between Boolean and Arithmetic Masking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2001, Third International Workshop, Paris, France, May 14-16, 2001, Proceedings, pp. 3-15, 2001, Springer, 3-540-42521-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Physical attacks, Masking Techniques, AES, Differential Power Analysis, Smartcards, IDEA, Electric consumption |
32 | Máire McLoone, John V. McCanny |
High Performance Single-Chip FPGA Rijndael Algorithm Implementations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2001, Third International Workshop, Paris, France, May 14-16, 2001, Proceedings, pp. 65-76, 2001, Springer, 3-540-42521-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Encryption, AES, Rijndael, FPGA Implementation |
32 | Jean-Sébastien Coron, Louis Goubin |
On Boolean and Arithmetic Masking against Differential Power Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings, pp. 231-237, 2000, Springer, 3-540-41455-X. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Physical attacks, Masking Techniques, AES, Differential Power Analysis, Smartcards, IDEA, Electric consumption |
32 | Jung Pil Choi |
Aspect-Oriented Programming with Enterprise JavaBeans. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDOC ![In: 4th International Enterprise Distributed Object Computing Conference (EDOC 2000), 25-28 September 2000, Makuhari, Japan, Proceedings, pp. 252-, 2000, IEEE Computer Society, 0-7695-0865-0. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
EJB server, generalized metaobject, EJBObject, testing application, security, middleware, object-oriented programming, aspect-oriented programming, AES, transaction processing, network protocols, container, enterprise JavaBeans, object persistence, location transparency |
31 | Lejla Batina, Benedikt Gierlichs, Kerstin Lemke-Rust |
Differential Cluster Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings, pp. 112-127, 2009, Springer, 978-3-642-04137-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Differential Cluster Analysis, AES Hardware, Differential Power Analysis, Collision Attacks, Side-channel Cryptanalysis |
31 | Shih-Ching Ou, Hung-Yuan Chung, Wen-Tsai Sung |
Improving the compression and encryption of images using FPGA-based cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 28(1-2), pp. 5-22, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Significance-linked connected component analysis (SLCCA), Image compression encryption scheme (ICES), Advance encryption standard (AES), Discrete wavelet transform (DWT) |
31 | Nicolas T. Courtois, Jacques Patarin |
About the XL Algorithm over GF(2). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2003, The Cryptographers' Track at the RSA Conference 2003, San Francisco, CA, USA, April 13-17, 2003, Proceedings, pp. 141-157, 2003, Springer, 3-540-00847-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
MQ problem, overdefined and exactly defined systems of multivariate equations, Gröbner bases, XSL attacks on AES, XL algorithm, Multivariate quadratic equations |
29 | Feng Ge, Pranjal Jain, Ken Choi |
Ultra-low power and high speed design and implementation of AES and SHA1 hardware cores in 65 nanometer CMOS technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EIT ![In: 2009 IEEE International Conference on Electro/Information Technology, EIT 2009, Windsor, Ontario, Canada, June 7-9, 2009, pp. 405-410, 2009, IEEE, 978-1-4244-3355-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Wen Ji, Lei Hu, Haiwen Ou |
Algebraic Attack to SMS4 and the Comparison with AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 662-665, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Florian Mendel, Thomas Peyrin, Christian Rechberger, Martin Schläffer |
Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 16th Annual International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers, pp. 16-35, 2009, Springer, 978-3-642-05443-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
semi-free-start collision, known-key distinguisher, cryptanalysis, block cipher, hash function |
29 | Andrea Di Biagio, Alessandro Barenghi, Giovanni Agosta, Gerardo Pelosi |
Design of a parallel AES for graphics hardware using the CUDA framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 23rd IEEE International Symposium on Parallel and Distributed Processing, IPDPS 2009, Rome, Italy, May 23-29, 2009, pp. 1-8, 2009, IEEE. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Fahad Bin Muhaya, Muhammad Usama, Muhammad Khurram Khan |
Modified AES Using Chaotic Key Generator for Satellite Imagery Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIC (1) ![In: Emerging Intelligent Computing Technology and Applications, 5th International Conference on Intelligent Computing, ICIC 2009, Ulsan, South Korea, September 16-19, 2009. Proceedings, pp. 1014-1024, 2009, Springer, 978-3-642-04069-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Mathieu Renauld, François-Xavier Standaert, Nicolas Veyrat-Charvillon |
Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings, pp. 97-111, 2009, Springer, 978-3-642-04137-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Nidhal Selmane, Sylvain Guilley, Jean-Luc Danger |
Practical Setup Time Violation Attacks on AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDCC ![In: Seventh European Dependable Computing Conference, EDCC-7 2008, Kaunas, Lithuania, 7-9 May 2008, pp. 91-96, 2008, IEEE Computer Society, 978-0-7695-3138-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Shay Gueron, Michael E. Kounavis |
Vortex: A New Family of One-Way Hash Functions Based on AES Rounds and Carry-Less Multiplication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings, pp. 331-340, 2008, Springer, 978-3-540-85884-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Md. Nazrul Islam, Md. Monir Hossain Mia, Muhammad F. I. Chowdhury, Mohammad Abdul Matin 0001 |
Effect of Security Increment to Symmetric Data Encryption through AES Methodology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD ![In: Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2008, In conjunction with Second International Workshop on Advanced Internet Technology and Applications, August 6-8, 2008, Phuket, Thailand, pp. 291-294, 2008, IEEE Computer Society, 978-0-7695-3263-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
plain text, cipher text, Block cipher, Computer Security, Differential cryptanalysis, Linear cryptanalysis, Symmetric Encryption |
29 | Miquel Pericàs, Ricardo Chaves, Georgi Gaydadjiev, Stamatis Vassiliadis, Mateo Valero |
Vectorized AES Core for High-throughput Secure Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VECPAR ![In: High Performance Computing for Computational Science - VECPAR 2008, 8th International Conference, Toulouse, France, June 24-27, 2008. Revised Selected Papers, pp. 83-94, 2008, Springer, 978-3-540-92858-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Encryption, Parallel and Distributed Computing |
29 | Philippe Bulens, François-Xavier Standaert, Jean-Jacques Quisquater, Pascal Pellegrin, Gaël Rouvroy |
Implementation of the AES-128 on Virtex-5 FPGAs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFRICACRYPT ![In: Progress in Cryptology - AFRICACRYPT 2008, First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings, pp. 16-26, 2008, Springer, 978-3-540-68159-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Mehran Mozaffari Kermani, Arash Reyhani-Masoleh |
A Lightweight Concurrent Fault Detection Scheme for the AES S-Boxes Using Normal Basis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings, pp. 113-129, 2008, Springer, 978-3-540-85052-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
fault detection, Advanced encryption standard, S-box, normal basis |
29 | Stefan Tillich, Johann Großschädl |
VLSI Implementation of a Functional Unit to Accelerate ECC and AES on 32-Bit Processors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WAIFI ![In: Arithmetic of Finite Fields, First International Workshop, WAIFI 2007, Madrid, Spain, June 21-22, 2007, Proceedings, pp. 40-54, 2007, Springer, 978-3-540-73073-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Xiao Ni, Weiren Shi, Victor Foo Siang Fook |
AES Security Protocol Implementation for Automobile Remote Keyless System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VTC Spring ![In: Proceedings of the 65th IEEE Vehicular Technology Conference, VTC Spring 2007, 22-25 April 2007, Dublin, Ireland, pp. 2526-2529, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Stefan Tillich, Christoph Herbst, Stefan Mangard |
Protecting AES Software Implementations on 32-Bit Processors Against Power Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings, pp. 141-157, 2007, Springer, 978-3-540-72737-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
software countermeasures, implementation security, Advanced Encryption Standard, side-channel attacks, DPA, power analysis, instruction set extensions |
29 | Ould-cheikh Mourad, Si-Mohamed Lotfy, Noureddine Mehallegue, Ahmed Bouridane, Camel Tanougast |
AES Embedded Hardware Implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AHS ![In: Second NASA/ESA Conference on Adaptive Hardware and Systems (AHS 2007), August 5-8, 2007, University of Edinburgh, Scotland, United Kingdom, pp. 103-109, 2007, IEEE Computer Society, 0-7695-2866-X. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Alexandre Ponce de Oliveira, Edward D. Moreno |
Impact of the DES and AES Algorithms on PERS (A Specific Processor for Sensor Networks). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSNC ![In: Proceedings of the Second International Conference on Systems and Networks Communications (ICSNC 2007), August 25-31, 2007, Cap Esterel, French Riviera, France, pp. 38, 2007, IEEE Computer Society, 0-7695-2938-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Michael Neve, Jean-Pierre Seifert |
Advances on Access-Driven Cache Attacks on AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers, pp. 147-162, 2006, Springer, 978-3-540-74461-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Panu Hämäläinen, Timo Alho, Marko Hännikäinen, Timo D. Hämäläinen |
Design and Implementation of Low-Area and Low-Power AES Encryption Hardware Core. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSD ![In: Ninth Euromicro Conference on Digital System Design: Architectures, Methods and Tools (DSD 2006), 30 August - 1 September 2006, Dubrovnik, Croatia, pp. 577-583, 2006, IEEE Computer Society, 0-7695-2609-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Nadia Nedjah, Luiza de Macedo Mourelle, Marco Paulo Cardoso |
A Compact Piplined Hardware Implementation of the AES-128 Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Third International Conference on Information Technology: New Generations (ITNG 2006), 10-12 April 2006, Las Vegas, Nevada, USA, pp. 216-221, 2006, IEEE Computer Society, 0-7695-2497-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Tianzhou Chen, Zhenjie He, Wei Hu 0001 |
Effectively implement AES for EFI/Tiano based on IA-32 Platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Third International Conference on Information Technology: New Generations (ITNG 2006), 10-12 April 2006, Las Vegas, Nevada, USA, pp. 570, 2006, IEEE Computer Society, 0-7695-2497-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Li Wang, Youren Wang, Rui Yao, Zhai Zhang |
Hardware Implementation of AES Based on Genetic Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNC (2) ![In: Advances in Natural Computation, Second International Conference, ICNC 2006, Xi'an, China, September 24-28, 2006. Proceedings, Part II, pp. 904-907, 2006, Springer, 3-540-45907-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Yoo-Jin Baek, Mi-Jung Noh |
DPA-Resistant Finite Field Multipliers and Secure AES Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings, pp. 1-12, 2006, Springer, 3-540-33052-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Matthew Darnall, Doug Kuhlman |
AES Software Implementations on ARM7TDMI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings, pp. 424-435, 2006, Springer, 3-540-49767-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Guido Bertoni, Luca Breveglieri, Roberto Farina, Francesco Regazzoni 0001 |
Speeding Up AES By Extending a 32 bit Processor Instruction Set. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASAP ![In: 2006 IEEE International Conference on Application-Specific Systems, Architecture and Processors (ASAP 2006), 11-13 September 2006, Steamboat Springs, Colorado, USA, pp. 275-282, 2006, IEEE Computer Society, 0-7695-2682-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Jens-Peter Kaps, Berk Sunar |
Energy Comparison of AES and SHA-1 for Ubiquitous Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC Workshops ![In: Emerging Directions in Embedded and Ubiquitous Computing, EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1-4, 2006, Proceedings, pp. 372-381, 2006, Springer, 3-540-36850-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Mehran Mozaffari Kermani, Arash Reyhani-Masoleh |
Parity Prediction of S-Box for AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCECE ![In: Proceedings of the Canadian Conference on Electrical and Computer Engineering, CCECE 2006, May 7-10, 2006, Ottawa Congress Centre, Ottawa, Canada, pp. 2357-2360, 2006, IEEE, 1-4244-0038-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Carlos Cid, Sean Murphy, Matthew J. B. Robshaw |
Small Scale Variants of the AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption: 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers, pp. 145-162, 2005, Springer, 3-540-26541-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Elisabeth Oswald, Stefan Mangard, Norbert Pramstaller, Vincent Rijmen |
A Side-Channel Analysis Resistant Description of the AES S-Box. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption: 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers, pp. 413-423, 2005, Springer, 3-540-26541-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Elisabeth Oswald, Kai Schramm |
An Efficient Masking Scheme for AES Software Implementations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 6th International Workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers, pp. 292-305, 2005, Springer, 3-540-31012-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Nicolas T. Courtois, Louis Goubin |
An Algebraic Masking Method to Protect AES Against Power Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers, pp. 199-209, 2005, Springer, 3-540-33354-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Emmanuel López-Trejo, Francisco Rodríguez-Henríquez, Arturo Díaz-Pérez |
An FPGA Implementation of CCM Mode Using AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers, pp. 322-334, 2005, Springer, 3-540-33354-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Deen Kotturi, Seong-Moo Yoo, John Blizzard |
AES crypto chip utilizing high-speed parallel pipelined architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS (5) ![In: International Symposium on Circuits and Systems (ISCAS 2005), 23-26 May 2005, Kobe, Japan, pp. 4653-4656, 2005, IEEE, 0-7803-8834-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Xinmiao Zhang, Keshab K. Parhi |
High-speed VLSI architectures for the AES algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Very Large Scale Integr. Syst. ![In: IEEE Trans. Very Large Scale Integr. Syst. 12(9), pp. 957-967, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Daniel Denning, Malachy Devlin, James Irvine 0001 |
Hardware co-simulation in system generator of the AES-128 encryption algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPGA ![In: Proceedings of the ACM/SIGDA 12th International Symposium on Field Programmable Gate Arrays, FPGA 2004, Monterey, California, USA, February 22-24, 2004, pp. 247, 2004, ACM, 1-58113-829-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Elena Trichina, Tymur Korkishko |
Secure AES Hardware Module for Resource Constrained Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESAS ![In: Security in Ad-hoc and Sensor Networks, First European Workshop, ESAS 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers, pp. 215-230, 2004, Springer, 3-540-24396-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Alireza Hodjat, Patrick Schaumont, Ingrid Verbauwhede |
Architectural Design Features of a Programmable High Throughput AES Coprocessor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (2) ![In: International Conference on Information Technology: Coding and Computing (ITCC'04), Volume 2, April 5-7, 2004, Las Vegas, Nevada, USA, pp. 498-502, 2004, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Sangwoo Park, Soo Hak Sung, Sangjin Lee 0002, Jongin Lim 0001 |
Improving the Upper Bound on the Maximum Differential and the Maximum Linear Hull Probability for SPN Structures and AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 10th International Workshop, FSE 2003, Lund, Sweden, February 24-26, 2003, Revised Papers, pp. 247-260, 2003, Springer, 3-540-20449-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
29 | Nazar Abbas Saqib, Francisco Rodríguez-Henríquez, Arturo Díaz-Pérez |
AES Algorithm Implementation-An efficient approach for Sequential and Pipeline Architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ENC ![In: 4th Mexican International Conference on Computer Science (ENC 2003), 8-12 September 2003, Apizaco, Mexico, pp. 126-130, 2003, IEEE Computer Society, 0-7695-1915-6. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
29 | Sumio Morioka, Akashi Satoh |
An Optimized S-Box Circuit Architecture for Low Power AES Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers, pp. 172-186, 2002, Springer, 3-540-00409-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
29 | Arjen K. Lenstra |
Unbelievable Security. Matching AES Security Using Public Key Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001, Proceedings, pp. 67-86, 2001, Springer, 3-540-42987-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
29 | Henry Kuo, Ingrid Verbauwhede |
Architectural Optimization for a 1.82Gbits/sec VLSI Implementation of the AES Rijndael Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2001, Third International Workshop, Paris, France, May 14-16, 2001, Proceedings, pp. 51-64, 2001, Springer, 3-540-42521-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
29 | Mehdi-Laurent Akkar, Christophe Giraud 0001 |
An Implementation of DES and AES, Secure against Some Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2001, Third International Workshop, Paris, France, May 14-16, 2001, Proceedings, pp. 309-318, 2001, Springer, 3-540-42521-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
29 | Andreas Dandalis, Viktor K. Prasanna, José D. P. Rolim |
A Comparative Study of Performance of AES Final Candidates Using FPGAs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings, pp. 125-140, 2000, Springer, 3-540-41455-X. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
27 | David Gullasch, Endre Bangerter, Stephan Krenn |
Cache Games - Bringing Access-Based Cache Attacks on AES to Practice. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Symposium on Security and Privacy ![In: 32nd IEEE Symposium on Security and Privacy, SP 2011, 22-25 May 2011, Berkeley, California, USA, pp. 490-505, 2011, IEEE Computer Society, 978-1-4577-0147-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
access-based cache attacks, AES, side channel |
27 | Marcel Medwed, Jörn-Marc Schmidt |
A Continuous Fault Countermeasure for AES Providing a Constant Error Detection Rate. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FDTC ![In: 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2010, Santa Barbara, California, USA, 21 August 2010, pp. 66-71, 2010, IEEE Computer Society, 978-0-7695-4169-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
EAN+B codes, redundant table lookups, AES, Fault attacks, countermeasure |
27 | Chester Rebeiro, Mainack Mondal, Debdeep Mukhopadhyay |
Pinpointing Cache Timing Attacks on AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLSI Design ![In: VLSI Design 2010: 23rd International Conference on VLSI Design, 9th International Conference on Embedded Systems, Bangalore, India, 3-7 January 2010, pp. 306-311, 2010, IEEE Computer Society, 978-0-7695-3928-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
AES, Side Channel Attacks, Countermeasures, Cache Attacks |
27 | Mohamed Abo El-Fotouh, Klaus Diepold |
The Pushdown Attack on AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece, pp. 280-285, 2009, IEEE Computer Society, 978-0-7695-3668-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Pushdown Attacks, Cryptanalysis, AES |
27 | Solmaz Ghaznavi, Catherine H. Gebotys, Reouven Elbaz |
Efficient Technique for the FPGA Implementation of the AES MixColumns Transformation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ReConFig ![In: ReConFig'09: 2009 International Conference on Reconfigurable Computing and FPGAs, Cancun, Quintana Roo, Mexico, 9-11 December 2009, Proceedings, pp. 219-224, 2009, IEEE Computer Society, 978-0-7695-3917-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
MixColumns, FPGA, architecture, AES, LUT |
27 | Felipe Ghellar, Marcelo Lubaszewski |
A novel AES cryptographic core highly resistant to differential power analysis attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SBCCI ![In: Proceedings of the 21st Annual Symposium on Integrated Circuits and Systems Design, SBCCI 2008, Gramado, Brazil, September 1-4, 2008, pp. 140-145, 2008, ACM, 978-1-60558-231-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
dpa, rijndael, isomorphisms, aes |
27 | Bryan Weeks, Mark Bean, Tom Rozylowicz, Chris Ficke |
Hardware Performance Simulations of Round 2 Advanced Encryption Standard Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AES Candidate Conference ![In: The Third Advanced Encryption Standard Candidate Conference, April 13-14, 2000, New York, New York, USA., pp. 286-304, 2000, National Institute of Standards and Technology,. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP BibTeX RDF |
|
27 | Dag Arne Osvik |
Speeding up Serpent. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AES Candidate Conference ![In: The Third Advanced Encryption Standard Candidate Conference, April 13-14, 2000, New York, New York, USA., pp. 317-329, 2000, National Institute of Standards and Technology,. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP BibTeX RDF |
|
27 | Makoto Sugita, Kazukuni Kobara, Kazuhiro Uehara, Shuji Kubota, Hideki Imai |
Relationships among Differential, Truncated Differential, Impossible Differential Cryptanalyses against Word-Oriented Block Ciphers like RIJNDAEL, E2. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AES Candidate Conference ![In: The Third Advanced Encryption Standard Candidate Conference, April 13-14, 2000, New York, New York, USA., pp. 242-254, 2000, National Institute of Standards and Technology,. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP BibTeX RDF |
|
27 | Tadayoshi Kohno, John Kelsey, Bruce Schneier |
Preliminary Cryptanalysis of Reduced-Round Serpent. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AES Candidate Conference ![In: The Third Advanced Encryption Standard Candidate Conference, April 13-14, 2000, New York, New York, USA., pp. 195-211, 2000, National Institute of Standards and Technology,. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP BibTeX RDF |
|
27 | Akashi Satoh, Nobuyuki Ooba, Kohji Takano, Edward D'Avignon |
High-Speed MARS Hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AES Candidate Conference ![In: The Third Advanced Encryption Standard Candidate Conference, April 13-14, 2000, New York, New York, USA., pp. 305-316, 2000, National Institute of Standards and Technology,. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP BibTeX RDF |
|
27 | Eli Biham, Vladimir Furman |
Impossible Differential on 8-Round MARS' Core. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AES Candidate Conference ![In: The Third Advanced Encryption Standard Candidate Conference, April 13-14, 2000, New York, New York, USA., pp. 186-194, 2000, National Institute of Standards and Technology,. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP BibTeX RDF |
|
27 | Stefan Lucks |
Attacking Seven Rounds of Rijndael under 192-bit and 256-bit Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AES Candidate Conference ![In: The Third Advanced Encryption Standard Candidate Conference, April 13-14, 2000, New York, New York, USA., pp. 215-229, 2000, National Institute of Standards and Technology,. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP BibTeX RDF |
|
27 | Ian Harvey |
The Effects of Multiple Algorithms in the Advanced Encryption Standard. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AES Candidate Conference ![In: The Third Advanced Encryption Standard Candidate Conference, April 13-14, 2000, New York, New York, USA., pp. 269-276, 2000, National Institute of Standards and Technology,. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP BibTeX RDF |
|
27 | Henri Gilbert, Marine Minier |
A Collision Attack on 7 Rounds of Rijndael. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AES Candidate Conference ![In: The Third Advanced Encryption Standard Candidate Conference, April 13-14, 2000, New York, New York, USA., pp. 230-241, 2000, National Institute of Standards and Technology,. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP BibTeX RDF |
|
27 | Don Coppersmith, Rosario Gennaro, Shai Halevi, Charanjit S. Jutla, Stephen M. Matyas, Mohammad Peyravian, David Safford, Nevenko Zunic |
IBM Comments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AES Candidate Conference ![In: The Third Advanced Encryption Standard Candidate Conference, April 13-14, 2000, New York, New York, USA., pp. 333-336, 2000, National Institute of Standards and Technology,. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP BibTeX RDF |
|
27 | John Kelsey, Bruce Schneier |
MARS Attacks! Preliminary Cryptanalysis of Reduced-Round MARS Variants. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AES Candidate Conference ![In: The Third Advanced Encryption Standard Candidate Conference, April 13-14, 2000, New York, New York, USA., pp. 169-185, 2000, National Institute of Standards and Technology,. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP BibTeX RDF |
|
27 | |
The Third Advanced Encryption Standard Candidate Conference, April 13-14, 2000, New York, New York, USA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AES Candidate Conference ![National Institute of Standards and Technology, The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP BibTeX RDF |
|
27 | Lawrence E. Bassham III |
Efficiency Testing of ANSI C Implementations of Round 2 Candidate Algorithms for the Advanced Encryption Standard. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AES Candidate Conference ![In: The Third Advanced Encryption Standard Candidate Conference, April 13-14, 2000, New York, New York, USA., pp. 136-148, 2000, National Institute of Standards and Technology,. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP BibTeX RDF |
|
27 | Ross J. Anderson, Eli Biham, Lars R. Knudsen |
The Case for Serpent. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AES Candidate Conference ![In: The Third Advanced Encryption Standard Candidate Conference, April 13-14, 2000, New York, New York, USA., pp. 349-354, 2000, National Institute of Standards and Technology,. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP BibTeX RDF |
|
26 | Fei Wu 0005, Liang Wang, Jiguang Wan |
A Low Cost and Inner-round Pipelined Design of ECB-AES-256 Crypto Engine for Solid State Disk. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NAS ![In: Fifth International Conference on Networking, Architecture, and Storage, NAS 2010, Macau, China, July 15-17, 2010, pp. 485-491, 2010, IEEE Computer Society, 978-0-7695-4134-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
inner-round, ECB-AES-256 crypto engine, SSD |
26 | Rong-Jian Chen, Yu-Cheng Peng, Jui-Lin Lai, Shi-Jinn Horng |
Architecture Design of High Efficient and Non-memory AES Crypto Core for WPAN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009, pp. 36-43, 2009, IEEE Computer Society, 978-0-7695-3838-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
AES Crypto Core, Cryptography, Architecture Design, WPAN |
26 | Ignacio Algredo-Badillo, Claudia Feregrino Uribe, René Cumplido, Miguel Morales-Sandoval |
FPGA Implementation and Performance Evaluation of AES-CCM Cores for Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ReConFig ![In: ReConFig'08: 2008 International Conference on Reconfigurable Computing and FPGAs, 3-5 December 2008, Cancun, Mexico, Proceedings, pp. 421-426, 2008, IEEE Computer Society, 978-0-7695-3474-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
AES-CCM, Wireless Networks, FPGA Implementation |
26 | Alireza Hodjat, David Hwang 0001, Bo-Cheng Lai, Kris Tiri, Ingrid Verbauwhede |
A 3.84 gbits/s AES crypto coprocessor with modes of operation in a 0.18-µm CMOS technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Great Lakes Symposium on VLSI ![In: Proceedings of the 15th ACM Great Lakes Symposium on VLSI 2005, Chicago, Illinois, USA, April 17-19, 2005, pp. 60-63, 2005, ACM, 1-59593-057-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
crypto-processor, security, FPGA, VLSI, cryptography, advanced encryption standard (AES), ASIC, hardware architectures |
26 | Debdeep Mukhopadhyay |
An Improved Fault Based Attack of the Advanced Encryption Standard. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFRICACRYPT ![In: Progress in Cryptology - AFRICACRYPT 2009, Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. Proceedings, pp. 421-434, 2009, Springer, 978-3-642-02383-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Alex Biryukov |
Design of a New Stream Cipher-LEX. ![Search on Bibsonomy](Pics/bibsonomy.png) |
The eSTREAM Finalists ![In: New Stream Cipher Designs - The eSTREAM Finalists, pp. 48-56, 2008, Springer, 978-3-540-68350-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Srinivasa Shivakar Vulli, Sanjeev Agarwal |
Individual-based artificial ecosystems for design and optimization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO ![In: Genetic and Evolutionary Computation Conference, GECCO 2008, Proceedings, Atlanta, GA, USA, July 12-16, 2008, pp. 273-280, 2008, ACM, 978-1-60558-130-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
artificial ecosystems, individual-based modeling, optimization, parameter estimation, Markov random fields |
26 | Jorge Nakahara Jr., Ivan Carlos Pavão |
Impossible-Differential Attacks on Large-Block Rijndael. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings, pp. 104-117, 2007, Springer, 978-3-540-75495-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
information security, Impossible differential cryptanalysis |
26 | Cuauhtemoc Mancillas-López, Debrup Chakraborty, Francisco Rodríguez-Henríquez |
Efficient Implementations of Some Tweakable Enciphering Schemes in Reconfigurable Hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2007, 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings, pp. 414-424, 2007, Springer, 978-3-540-77025-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Ming-Haw Jing, Jian-Hong Chen, Zih-Heng Chen, Yaotsu Chang |
The Secure DAES Design for Embedded System Application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC Workshops ![In: Emerging Directions in Embedded and Ubiquitous Computing, EUC 2007 Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei, Taiwan, December 17-20, 2007, Proceedings, pp. 617-626, 2007, Springer, 978-3-540-77089-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
branch number, repeating property, symmetric encryption algorithms, embedded system, Advanced Encryption Standard, data security |
26 | Alex Biryukov, Dmitry Khovratovich |
Two New Techniques of Side-Channel Cryptanalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings, pp. 195-208, 2007, Springer, 978-3-540-74734-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Andrey Bogdanov, Lars R. Knudsen, Gregor Leander, Christof Paar, Axel Poschmann, Matthew J. B. Robshaw, Yannick Seurin, C. Vikkelsoe |
PRESENT: An Ultra-Lightweight Block Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings, pp. 450-466, 2007, Springer, 978-3-540-74734-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Reouven Elbaz, Lionel Torres, Gilles Sassatelli, Pierre Guillemin, Michel Bardouillet, Albert Martinez |
A Comparison of Two Approaches Providing Data Encryption and Authentication on a Processor Memory Bus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PATMOS ![In: Integrated Circuit and System Design. Power and Timing Modeling, Optimization and Simulation, 16th International Workshop, PATMOS 2006, Montpellier, France, September 13-15, 2006, Proceedings, pp. 267-279, 2006, Springer, 3-540-39094-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Alex Biryukov |
The Design of a Stream Cipher LEX. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers, pp. 67-75, 2006, Springer, 978-3-540-74461-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Michal Procházka, Petr Holub, Eva Hladká |
Active Element Network with P2P Control Plane. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSOS/EuroNGI ![In: Self-Organizing Systems, First International Workshop, IWSOS 2006, and Third International Workshop on New Trends in Network Architectures and Services, EuroNGI 2006, Passau, Germany, September 18-20, 2006, Proceedings, pp. 257, 2006, Springer, 3-540-37658-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Milan Markovic, Goran Dordevic |
On Implementation Aspects of Standard Asymmetric and Symmetric Cryptographic Algorithms on TI Signal Processors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecPerU ![In: Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2006), 29 June 2006, Lyon, France, pp. 57-62, 2006, IEEE Computer Society, 0-7695-2549-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Mitsuru Matsui |
How Far Can We Go on the x64 Processors? ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 13th International Workshop, FSE 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers, pp. 341-358, 2006, Springer, 3-540-36597-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Wei Hu, Jason Hiser, Daniel W. Williams, Adrian Filipi, Jack W. Davidson, David Evans 0001, John C. Knight, Anh Nguyen-Tuong, Jonathan C. Rowanhill |
Secure and practical defense against code-injection attacks using software dynamic translation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VEE ![In: Proceedings of the 2nd International Conference on Virtual Execution Environments, VEE 2006, Ottawa, Ontario, Canada, June 14-16, 2006, pp. 2-12, 2006, ACM, 978-1-59593-332-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
software dynamic translation, virtual execution |
26 | Jorge Nakahara Jr., Daniel Santana de Freitas, Raphael Chung-Wei Phan |
New Multiset Attacks on Rijndael with Large Blocks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mycrypt ![In: Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings, pp. 277-295, 2005, Springer, 3-540-28938-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
higher-order multiset attacks, cryptanalysis, Rijndael |
26 | Nicolas T. Courtois |
Algebraic Attacks over GF(2k), Application to HFE Challenge 2 and Sflash-v2. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004, pp. 201-217, 2004, Springer, 3-540-21018-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Taizo Shirai, Kyoji Shibutani |
Improving Immunity of Feistel Ciphers against Differential Cryptanalysis by Using Multiple MDS Matrices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 11th International Workshop, FSE 2004, Delhi, India, February 5-7, 2004, Revised Papers, pp. 260-278, 2004, Springer, 3-540-22171-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
active S-boxes, multiple MDS design, MDS, Feistel cipher |
26 | Kaijie Wu 0001, Ramesh Karri, Grigori Kuznetsov, Michael Gössel |
Low Cost Concurrent Error Detection for the Advanced Encryption Standard. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITC ![In: Proceedings 2004 International Test Conference (ITC 2004), October 26-28, 2004, Charlotte, NC, USA, pp. 1242-1248, 2004, IEEE Computer Society, 0-7803-8581-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Alex Panato, Marcelo Barcelos, Ricardo Augusto da Luz Reis |
A Low Device Occupation IP to Implement Rijndael Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DATE ![In: 2003 Design, Automation and Test in Europe Conference and Exposition (DATE 2003), 3-7 March 2003, Munich, Germany, pp. 20020-20025, 2003, IEEE Computer Society, 0-7695-1870-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Subhayan Sen, Chandrama Shaw, Dipanwita Roy Chowdhury, Niloy Ganguly, Parimal Pal Chaudhuri |
Cellular Automata Based Cryptosystem (CAC). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings, pp. 303-314, 2002, Springer, 3-540-00164-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|