The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for AES with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1987-1999 (21) 2000 (46) 2001 (27) 2002 (53) 2003 (70) 2004 (95) 2005 (93) 2006 (119) 2007 (131) 2008 (147) 2009 (131) 2010 (108) 2011 (132) 2012 (97) 2013 (117) 2014 (133) 2015 (106) 2016 (107) 2017 (140) 2018 (131) 2019 (132) 2020 (134) 2021 (109) 2022 (135) 2023 (117) 2024 (34)
Publication types (Num. hits)
article(965) book(2) incollection(10) inproceedings(1674) phdthesis(9) proceedings(5)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1145 occurrences of 417 keywords

Results
Found 2665 publication records. Showing 2665 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
32Nele Mentens, Lejla Batina, Bart Preneel, Ingrid Verbauwhede A Systematic Evaluation of Compact Hardware Implementations for the Rijndael S-Box. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF inversion in GF(2n), smart card implementation, AES, S-box, composite fields
32Jorge Nakahara Jr., Daniel Santana de Freitas Cryptanalysis of Ake98. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Akelarre, Ake98, RC5, cryptanalysis, AES, IDEA, RC6
32Jakob Jonsson On the Security of CTR + CBC-MAC. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF AES, modes of operation, authenticated encryption
32Baodian Wei, Dongsu Liu, Xinmei Wang The General Autocorrelation and Its Application. Search on Bibsonomy CW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Strict avalanche criterion, Propagation Criterion, Boolean function, AES, Autocorrelation, Linear structure
32Máire McLoone, John V. McCanny Single-Chip FPGA Implementation of the Advanced Encryption Standard Algorithm. Search on Bibsonomy FPL The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Encryption, AES, Rijndael, FPGA Implementation
32Louis Goubin A Sound Method for Switching between Boolean and Arithmetic Masking. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Physical attacks, Masking Techniques, AES, Differential Power Analysis, Smartcards, IDEA, Electric consumption
32Máire McLoone, John V. McCanny High Performance Single-Chip FPGA Rijndael Algorithm Implementations. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Encryption, AES, Rijndael, FPGA Implementation
32Jean-Sébastien Coron, Louis Goubin On Boolean and Arithmetic Masking against Differential Power Analysis. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Physical attacks, Masking Techniques, AES, Differential Power Analysis, Smartcards, IDEA, Electric consumption
32Jung Pil Choi Aspect-Oriented Programming with Enterprise JavaBeans. Search on Bibsonomy EDOC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF EJB server, generalized metaobject, EJBObject, testing application, security, middleware, object-oriented programming, aspect-oriented programming, AES, transaction processing, network protocols, container, enterprise JavaBeans, object persistence, location transparency
31Lejla Batina, Benedikt Gierlichs, Kerstin Lemke-Rust Differential Cluster Analysis. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Differential Cluster Analysis, AES Hardware, Differential Power Analysis, Collision Attacks, Side-channel Cryptanalysis
31Shih-Ching Ou, Hung-Yuan Chung, Wen-Tsai Sung Improving the compression and encryption of images using FPGA-based cryptosystems. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Significance-linked connected component analysis (SLCCA), Image compression encryption scheme (ICES), Advance encryption standard (AES), Discrete wavelet transform (DWT)
31Nicolas T. Courtois, Jacques Patarin About the XL Algorithm over GF(2). Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF MQ problem, overdefined and exactly defined systems of multivariate equations, Gröbner bases, XSL attacks on AES, XL algorithm, Multivariate quadratic equations
29Feng Ge, Pranjal Jain, Ken Choi Ultra-low power and high speed design and implementation of AES and SHA1 hardware cores in 65 nanometer CMOS technology. Search on Bibsonomy EIT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
29Wen Ji, Lei Hu, Haiwen Ou Algebraic Attack to SMS4 and the Comparison with AES. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
29Florian Mendel, Thomas Peyrin, Christian Rechberger, Martin Schläffer Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF semi-free-start collision, known-key distinguisher, cryptanalysis, block cipher, hash function
29Andrea Di Biagio, Alessandro Barenghi, Giovanni Agosta, Gerardo Pelosi Design of a parallel AES for graphics hardware using the CUDA framework. Search on Bibsonomy IPDPS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
29Fahad Bin Muhaya, Muhammad Usama, Muhammad Khurram Khan Modified AES Using Chaotic Key Generator for Satellite Imagery Encryption. Search on Bibsonomy ICIC (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
29Mathieu Renauld, François-Xavier Standaert, Nicolas Veyrat-Charvillon Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
29Nidhal Selmane, Sylvain Guilley, Jean-Luc Danger Practical Setup Time Violation Attacks on AES. Search on Bibsonomy EDCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Shay Gueron, Michael E. Kounavis Vortex: A New Family of One-Way Hash Functions Based on AES Rounds and Carry-Less Multiplication. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Md. Nazrul Islam, Md. Monir Hossain Mia, Muhammad F. I. Chowdhury, Mohammad Abdul Matin 0001 Effect of Security Increment to Symmetric Data Encryption through AES Methodology. Search on Bibsonomy SNPD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF plain text, cipher text, Block cipher, Computer Security, Differential cryptanalysis, Linear cryptanalysis, Symmetric Encryption
29Miquel Pericàs, Ricardo Chaves, Georgi Gaydadjiev, Stamatis Vassiliadis, Mateo Valero Vectorized AES Core for High-throughput Secure Environments. Search on Bibsonomy VECPAR The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Encryption, Parallel and Distributed Computing
29Philippe Bulens, François-Xavier Standaert, Jean-Jacques Quisquater, Pascal Pellegrin, Gaël Rouvroy Implementation of the AES-128 on Virtex-5 FPGAs. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Mehran Mozaffari Kermani, Arash Reyhani-Masoleh A Lightweight Concurrent Fault Detection Scheme for the AES S-Boxes Using Normal Basis. Search on Bibsonomy CHES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF fault detection, Advanced encryption standard, S-box, normal basis
29Stefan Tillich, Johann Großschädl VLSI Implementation of a Functional Unit to Accelerate ECC and AES on 32-Bit Processors. Search on Bibsonomy WAIFI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Xiao Ni, Weiren Shi, Victor Foo Siang Fook AES Security Protocol Implementation for Automobile Remote Keyless System. Search on Bibsonomy VTC Spring The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Stefan Tillich, Christoph Herbst, Stefan Mangard Protecting AES Software Implementations on 32-Bit Processors Against Power Analysis. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF software countermeasures, implementation security, Advanced Encryption Standard, side-channel attacks, DPA, power analysis, instruction set extensions
29Ould-cheikh Mourad, Si-Mohamed Lotfy, Noureddine Mehallegue, Ahmed Bouridane, Camel Tanougast AES Embedded Hardware Implementation. Search on Bibsonomy AHS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Alexandre Ponce de Oliveira, Edward D. Moreno Impact of the DES and AES Algorithms on PERS (A Specific Processor for Sensor Networks). Search on Bibsonomy ICSNC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Michael Neve, Jean-Pierre Seifert Advances on Access-Driven Cache Attacks on AES. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Panu Hämäläinen, Timo Alho, Marko Hännikäinen, Timo D. Hämäläinen Design and Implementation of Low-Area and Low-Power AES Encryption Hardware Core. Search on Bibsonomy DSD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Nadia Nedjah, Luiza de Macedo Mourelle, Marco Paulo Cardoso A Compact Piplined Hardware Implementation of the AES-128 Cipher. Search on Bibsonomy ITNG The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Tianzhou Chen, Zhenjie He, Wei Hu 0001 Effectively implement AES for EFI/Tiano based on IA-32 Platform. Search on Bibsonomy ITNG The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Li Wang, Youren Wang, Rui Yao, Zhai Zhang Hardware Implementation of AES Based on Genetic Algorithm. Search on Bibsonomy ICNC (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Yoo-Jin Baek, Mi-Jung Noh DPA-Resistant Finite Field Multipliers and Secure AES Design. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Matthew Darnall, Doug Kuhlman AES Software Implementations on ARM7TDMI. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Guido Bertoni, Luca Breveglieri, Roberto Farina, Francesco Regazzoni 0001 Speeding Up AES By Extending a 32 bit Processor Instruction Set. Search on Bibsonomy ASAP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Jens-Peter Kaps, Berk Sunar Energy Comparison of AES and SHA-1 for Ubiquitous Computing. Search on Bibsonomy EUC Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Mehran Mozaffari Kermani, Arash Reyhani-Masoleh Parity Prediction of S-Box for AES. Search on Bibsonomy CCECE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Carlos Cid, Sean Murphy, Matthew J. B. Robshaw Small Scale Variants of the AES. Search on Bibsonomy FSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
29Elisabeth Oswald, Stefan Mangard, Norbert Pramstaller, Vincent Rijmen A Side-Channel Analysis Resistant Description of the AES S-Box. Search on Bibsonomy FSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
29Elisabeth Oswald, Kai Schramm An Efficient Masking Scheme for AES Software Implementations. Search on Bibsonomy WISA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
29Nicolas T. Courtois, Louis Goubin An Algebraic Masking Method to Protect AES Against Power Attacks. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
29Emmanuel López-Trejo, Francisco Rodríguez-Henríquez, Arturo Díaz-Pérez An FPGA Implementation of CCM Mode Using AES. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
29Deen Kotturi, Seong-Moo Yoo, John Blizzard AES crypto chip utilizing high-speed parallel pipelined architecture. Search on Bibsonomy ISCAS (5) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
29Xinmiao Zhang, Keshab K. Parhi High-speed VLSI architectures for the AES algorithm. Search on Bibsonomy IEEE Trans. Very Large Scale Integr. Syst. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
29Daniel Denning, Malachy Devlin, James Irvine 0001 Hardware co-simulation in system generator of the AES-128 encryption algorithm. Search on Bibsonomy FPGA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
29Elena Trichina, Tymur Korkishko Secure AES Hardware Module for Resource Constrained Devices. Search on Bibsonomy ESAS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
29Alireza Hodjat, Patrick Schaumont, Ingrid Verbauwhede Architectural Design Features of a Programmable High Throughput AES Coprocessor. Search on Bibsonomy ITCC (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
29Sangwoo Park, Soo Hak Sung, Sangjin Lee 0002, Jongin Lim 0001 Improving the Upper Bound on the Maximum Differential and the Maximum Linear Hull Probability for SPN Structures and AES. Search on Bibsonomy FSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
29Nazar Abbas Saqib, Francisco Rodríguez-Henríquez, Arturo Díaz-Pérez AES Algorithm Implementation-An efficient approach for Sequential and Pipeline Architectures. Search on Bibsonomy ENC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
29Sumio Morioka, Akashi Satoh An Optimized S-Box Circuit Architecture for Low Power AES Design. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
29Arjen K. Lenstra Unbelievable Security. Matching AES Security Using Public Key Systems. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
29Henry Kuo, Ingrid Verbauwhede Architectural Optimization for a 1.82Gbits/sec VLSI Implementation of the AES Rijndael Algorithm. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
29Mehdi-Laurent Akkar, Christophe Giraud 0001 An Implementation of DES and AES, Secure against Some Attacks. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
29Andreas Dandalis, Viktor K. Prasanna, José D. P. Rolim A Comparative Study of Performance of AES Final Candidates Using FPGAs. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
27David Gullasch, Endre Bangerter, Stephan Krenn Cache Games - Bringing Access-Based Cache Attacks on AES to Practice. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 2011 DBLP  DOI  BibTeX  RDF access-based cache attacks, AES, side channel
27Marcel Medwed, Jörn-Marc Schmidt A Continuous Fault Countermeasure for AES Providing a Constant Error Detection Rate. Search on Bibsonomy FDTC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF EAN+B codes, redundant table lookups, AES, Fault attacks, countermeasure
27Chester Rebeiro, Mainack Mondal, Debdeep Mukhopadhyay Pinpointing Cache Timing Attacks on AES. Search on Bibsonomy VLSI Design The full citation details ... 2010 DBLP  DOI  BibTeX  RDF AES, Side Channel Attacks, Countermeasures, Cache Attacks
27Mohamed Abo El-Fotouh, Klaus Diepold The Pushdown Attack on AES. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Pushdown Attacks, Cryptanalysis, AES
27Solmaz Ghaznavi, Catherine H. Gebotys, Reouven Elbaz Efficient Technique for the FPGA Implementation of the AES MixColumns Transformation. Search on Bibsonomy ReConFig The full citation details ... 2009 DBLP  DOI  BibTeX  RDF MixColumns, FPGA, architecture, AES, LUT
27Felipe Ghellar, Marcelo Lubaszewski A novel AES cryptographic core highly resistant to differential power analysis attacks. Search on Bibsonomy SBCCI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF dpa, rijndael, isomorphisms, aes
27Bryan Weeks, Mark Bean, Tom Rozylowicz, Chris Ficke Hardware Performance Simulations of Round 2 Advanced Encryption Standard Algorithms. Search on Bibsonomy AES Candidate Conference The full citation details ... 2000 DBLP  BibTeX  RDF
27Dag Arne Osvik Speeding up Serpent. Search on Bibsonomy AES Candidate Conference The full citation details ... 2000 DBLP  BibTeX  RDF
27Makoto Sugita, Kazukuni Kobara, Kazuhiro Uehara, Shuji Kubota, Hideki Imai Relationships among Differential, Truncated Differential, Impossible Differential Cryptanalyses against Word-Oriented Block Ciphers like RIJNDAEL, E2. Search on Bibsonomy AES Candidate Conference The full citation details ... 2000 DBLP  BibTeX  RDF
27Tadayoshi Kohno, John Kelsey, Bruce Schneier Preliminary Cryptanalysis of Reduced-Round Serpent. Search on Bibsonomy AES Candidate Conference The full citation details ... 2000 DBLP  BibTeX  RDF
27Akashi Satoh, Nobuyuki Ooba, Kohji Takano, Edward D'Avignon High-Speed MARS Hardware. Search on Bibsonomy AES Candidate Conference The full citation details ... 2000 DBLP  BibTeX  RDF
27Eli Biham, Vladimir Furman Impossible Differential on 8-Round MARS' Core. Search on Bibsonomy AES Candidate Conference The full citation details ... 2000 DBLP  BibTeX  RDF
27Stefan Lucks Attacking Seven Rounds of Rijndael under 192-bit and 256-bit Keys. Search on Bibsonomy AES Candidate Conference The full citation details ... 2000 DBLP  BibTeX  RDF
27Ian Harvey The Effects of Multiple Algorithms in the Advanced Encryption Standard. Search on Bibsonomy AES Candidate Conference The full citation details ... 2000 DBLP  BibTeX  RDF
27Henri Gilbert, Marine Minier A Collision Attack on 7 Rounds of Rijndael. Search on Bibsonomy AES Candidate Conference The full citation details ... 2000 DBLP  BibTeX  RDF
27Don Coppersmith, Rosario Gennaro, Shai Halevi, Charanjit S. Jutla, Stephen M. Matyas, Mohammad Peyravian, David Safford, Nevenko Zunic IBM Comments. Search on Bibsonomy AES Candidate Conference The full citation details ... 2000 DBLP  BibTeX  RDF
27John Kelsey, Bruce Schneier MARS Attacks! Preliminary Cryptanalysis of Reduced-Round MARS Variants. Search on Bibsonomy AES Candidate Conference The full citation details ... 2000 DBLP  BibTeX  RDF
27 The Third Advanced Encryption Standard Candidate Conference, April 13-14, 2000, New York, New York, USA. Search on Bibsonomy AES Candidate Conference The full citation details ... 2000 DBLP  BibTeX  RDF
27Lawrence E. Bassham III Efficiency Testing of ANSI C Implementations of Round 2 Candidate Algorithms for the Advanced Encryption Standard. Search on Bibsonomy AES Candidate Conference The full citation details ... 2000 DBLP  BibTeX  RDF
27Ross J. Anderson, Eli Biham, Lars R. Knudsen The Case for Serpent. Search on Bibsonomy AES Candidate Conference The full citation details ... 2000 DBLP  BibTeX  RDF
26Fei Wu 0005, Liang Wang, Jiguang Wan A Low Cost and Inner-round Pipelined Design of ECB-AES-256 Crypto Engine for Solid State Disk. Search on Bibsonomy NAS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF inner-round, ECB-AES-256 crypto engine, SSD
26Rong-Jian Chen, Yu-Cheng Peng, Jui-Lin Lai, Shi-Jinn Horng Architecture Design of High Efficient and Non-memory AES Crypto Core for WPAN. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF AES Crypto Core, Cryptography, Architecture Design, WPAN
26Ignacio Algredo-Badillo, Claudia Feregrino Uribe, René Cumplido, Miguel Morales-Sandoval FPGA Implementation and Performance Evaluation of AES-CCM Cores for Wireless Networks. Search on Bibsonomy ReConFig The full citation details ... 2008 DBLP  DOI  BibTeX  RDF AES-CCM, Wireless Networks, FPGA Implementation
26Alireza Hodjat, David Hwang 0001, Bo-Cheng Lai, Kris Tiri, Ingrid Verbauwhede A 3.84 gbits/s AES crypto coprocessor with modes of operation in a 0.18-µm CMOS technology. Search on Bibsonomy ACM Great Lakes Symposium on VLSI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF crypto-processor, security, FPGA, VLSI, cryptography, advanced encryption standard (AES), ASIC, hardware architectures
26Debdeep Mukhopadhyay An Improved Fault Based Attack of the Advanced Encryption Standard. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Alex Biryukov Design of a New Stream Cipher-LEX. Search on Bibsonomy The eSTREAM Finalists The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Srinivasa Shivakar Vulli, Sanjeev Agarwal Individual-based artificial ecosystems for design and optimization. Search on Bibsonomy GECCO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF artificial ecosystems, individual-based modeling, optimization, parameter estimation, Markov random fields
26Jorge Nakahara Jr., Ivan Carlos Pavão Impossible-Differential Attacks on Large-Block Rijndael. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF information security, Impossible differential cryptanalysis
26Cuauhtemoc Mancillas-López, Debrup Chakraborty, Francisco Rodríguez-Henríquez Efficient Implementations of Some Tweakable Enciphering Schemes in Reconfigurable Hardware. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Ming-Haw Jing, Jian-Hong Chen, Zih-Heng Chen, Yaotsu Chang The Secure DAES Design for Embedded System Application. Search on Bibsonomy EUC Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF branch number, repeating property, symmetric encryption algorithms, embedded system, Advanced Encryption Standard, data security
26Alex Biryukov, Dmitry Khovratovich Two New Techniques of Side-Channel Cryptanalysis. Search on Bibsonomy CHES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Andrey Bogdanov, Lars R. Knudsen, Gregor Leander, Christof Paar, Axel Poschmann, Matthew J. B. Robshaw, Yannick Seurin, C. Vikkelsoe PRESENT: An Ultra-Lightweight Block Cipher. Search on Bibsonomy CHES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Reouven Elbaz, Lionel Torres, Gilles Sassatelli, Pierre Guillemin, Michel Bardouillet, Albert Martinez A Comparison of Two Approaches Providing Data Encryption and Authentication on a Processor Memory Bus. Search on Bibsonomy PATMOS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Alex Biryukov The Design of a Stream Cipher LEX. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Michal Procházka, Petr Holub, Eva Hladká Active Element Network with P2P Control Plane. Search on Bibsonomy IWSOS/EuroNGI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Milan Markovic, Goran Dordevic On Implementation Aspects of Standard Asymmetric and Symmetric Cryptographic Algorithms on TI Signal Processors. Search on Bibsonomy SecPerU The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Mitsuru Matsui How Far Can We Go on the x64 Processors? Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Wei Hu, Jason Hiser, Daniel W. Williams, Adrian Filipi, Jack W. Davidson, David Evans 0001, John C. Knight, Anh Nguyen-Tuong, Jonathan C. Rowanhill Secure and practical defense against code-injection attacks using software dynamic translation. Search on Bibsonomy VEE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF software dynamic translation, virtual execution
26Jorge Nakahara Jr., Daniel Santana de Freitas, Raphael Chung-Wei Phan New Multiset Attacks on Rijndael with Large Blocks. Search on Bibsonomy Mycrypt The full citation details ... 2005 DBLP  DOI  BibTeX  RDF higher-order multiset attacks, cryptanalysis, Rijndael
26Nicolas T. Courtois Algebraic Attacks over GF(2k), Application to HFE Challenge 2 and Sflash-v2. Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Taizo Shirai, Kyoji Shibutani Improving Immunity of Feistel Ciphers against Differential Cryptanalysis by Using Multiple MDS Matrices. Search on Bibsonomy FSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF active S-boxes, multiple MDS design, MDS, Feistel cipher
26Kaijie Wu 0001, Ramesh Karri, Grigori Kuznetsov, Michael Gössel Low Cost Concurrent Error Detection for the Advanced Encryption Standard. Search on Bibsonomy ITC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Alex Panato, Marcelo Barcelos, Ricardo Augusto da Luz Reis A Low Device Occupation IP to Implement Rijndael Algorithm. Search on Bibsonomy DATE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
26Subhayan Sen, Chandrama Shaw, Dipanwita Roy Chowdhury, Niloy Ganguly, Parimal Pal Chaudhuri Cellular Automata Based Cryptosystem (CAC). Search on Bibsonomy ICICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 2665 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license