The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for AES with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1987-1999 (21) 2000 (46) 2001 (27) 2002 (53) 2003 (70) 2004 (95) 2005 (93) 2006 (119) 2007 (131) 2008 (147) 2009 (131) 2010 (108) 2011 (132) 2012 (97) 2013 (117) 2014 (133) 2015 (106) 2016 (107) 2017 (140) 2018 (131) 2019 (132) 2020 (134) 2021 (109) 2022 (135) 2023 (117) 2024 (34)
Publication types (Num. hits)
article(965) book(2) incollection(10) inproceedings(1674) phdthesis(9) proceedings(5)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1145 occurrences of 417 keywords

Results
Found 2665 publication records. Showing 2665 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
26Kris Gaj, Pawel Chodowiec Fast Implementation and Fair Comparison of the Final Candidates for Advanced Encryption Standard Using Field Programmable Gate Arrays. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
26Louis Granboulan, Phong Q. Nguyen, Fabrice Noilhan, Serge Vaudenay DFCv2. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
26Adam J. Elbirt, Christof Paar An FPGA implementation and performance evaluation of the Serpent block cipher. Search on Bibsonomy FPGA The full citation details ... 2000 DBLP  DOI  BibTeX  RDF algorithm-agility, FPGA, cryptography, VHDL, block cipher
24Russ Housley, Hannes Tschofenig CBOR Object Signing and Encryption (COSE): AES-CTR and AES-CBC. Search on Bibsonomy RFC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Xiaoyang Dong, Shun Li, Phuong Pham Chosen-Key Distinguishing Attacks on Full AES-192, AES-256, Kiasu-BC, and More. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
24Udai Wasmi Abboud, Moceheb Lazam Shuwandy SDA Plus: Improving the Performance of the System Determine Algorithm (SDA) of the Switching Between AES-128 and AES-256 (MOLAZ Method). Search on Bibsonomy ICSET The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Virginia Zúñiga-González, Erica Tena-Sánchez, Antonio J. Acosta 0001 A Security Comparison between AES-128 and AES-256 FPGA implementations against DPA attacks. Search on Bibsonomy DCIS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Xinfei Guo, Mohamed El-Hadedy 0001, Sergiu Mosanu, Xiangdong Wei, Kevin Skadron, Mircea R. Stan Agile-AES: Implementation of configurable AES primitive with agile design approach. Search on Bibsonomy Integr. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24SeongHan Shin, Shota Yamada 0001, Goichiro Hanaoka, Yusuke Ishida, Atsushi Kunii, Junichi Oketani, Shimpei Kunii, Kiyoshi Tomomura How to Extend CTRT for AES-256 and AES-192. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Wai-Kong Lee, Hwajeong Seo, Seog Chung Seo, Seong Oun Hwang Efficient Implementation of AES-CTR and AES-ECB on GPUs With Applications for High-Speed FrodoKEM and Exhaustive Key Search. Search on Bibsonomy IEEE Trans. Circuits Syst. II Express Briefs The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Cavidan Yakupoglu, Kurt Rohloff PREFHE, PREFHE-AES and PREFHE-SGX: Secure Multiparty Computation Protocols from Fully Homomorphic Encryption and Proxy ReEncryption with AES and Intel SGX. Search on Bibsonomy SecureComm The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Yusuke Naito 0001, Yu Sasaki, Takeshi Sugawara 0001 AES-LBBB: AES Mode for Lightweight and BBB-Secure Authenticated Encryption. Search on Bibsonomy IACR Trans. Cryptogr. Hardw. Embed. Syst. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Alexandre Adomnicai, Thomas Peyrin Fixslicing AES-like Ciphers New bitsliced AES speed records on ARM-Cortex M and RISC-V. Search on Bibsonomy IACR Trans. Cryptogr. Hardw. Embed. Syst. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24S. Srisakthi, A. P. Shanthi Towards the Design of a Stronger AES: AES with Key Dependent Shift Rows (KDSR). Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Alexandre Adomnicai, Thomas Peyrin Fixslicing AES-like Ciphers: New bitsliced AES speed records on ARM-Cortex M and RISC-V. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2020 DBLP  BibTeX  RDF
24John Preuß Mattsson, Daniel Migault ECDHE_PSK with AES-GCM and AES-CCM Cipher Suites for TLS 1.2 and DTLS 1.2. Search on Bibsonomy RFC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
24Rahul Saha, G. Geetha 0001, Gulshan Kumar, Tai-Hoon Kim RK-AES: An Improved Version of AES Using a New Key Generation Process with Random Keys. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
24Felix Wegener, Amir Moradi 0001 Yet Another Size Record for AES: A First-Order SCA Secure AES S-box Based on GF(28) Multiplication. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2018 DBLP  BibTeX  RDF
24Ben Lapid, Avishai Wool Cache-Attacks on the ARM TrustZone implementations of AES-256 and AES-256-GCM via GPU-based analysis. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2018 DBLP  BibTeX  RDF
24Guido Marco Bertoni, Lorenzo Grassi 0001, Filippo Melzani Simulations of Optical Emissions for Attacking AES and Masked AES. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2018 DBLP  BibTeX  RDF
24Nir Drucker, Shay Gueron, Vlad Krasnov Making AES great again: the forthcoming vectorized AES instruction. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2018 DBLP  BibTeX  RDF
24Yong Zhang, Ning Wu, Fang Zhou 0001, Xiaoqiang Zhang 0001, Jinbao Zhang 0002 High performance AES-GCM implementation based on efficient AES and FR-KOA multiplier. Search on Bibsonomy IEICE Electron. Express The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
24Ben Lapid, Avishai Wool Cache-Attacks on the ARM TrustZone Implementations of AES-256 and AES-256-GCM via GPU-Based Analysis. Search on Bibsonomy SAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
24Amandeep Singh, Praveen Agarwal, Mehar Chand A Comparative Study of Audio Encryption Analysis Using Dynamic AES and Standard AES Algorithms. Search on Bibsonomy SOFA (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
24Felix Wegener, Amir Moradi 0001 Yet Another Size Record for AES: A First-Order SCA Secure AES S-Box Based on \(\mathrm {GF}(2^8)\) Multiplication. Search on Bibsonomy CARDIS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
24Mustafa Khairallah, Anupam Chattopadhyay, Thomas Peyrin Looting the LUTs : FPGA Optimization of AES and AES-like Ciphers for Authenticated Encryption. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2017 DBLP  BibTeX  RDF
24Sandhya Koteshwara, Amitabh Das, Keshab K. Parhi Performance comparison of AES-GCM-SIV and AES-GCM algorithms for authenticated encryption on FPGA platforms. Search on Bibsonomy ACSSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
24Mustafa Khairallah, Anupam Chattopadhyay, Thomas Peyrin Looting the LUTs: FPGA Optimization of AES and AES-like Ciphers for Authenticated Encryption. Search on Bibsonomy INDOCRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
24Liandeng Li, Jiarui Fang, Jinlei Jiang, Lin Gan, Weijie Zheng 0001, Haohuan Fu, Guangwen Yang SW-AES: Accelerating AES Algorithm on the Sunway TaihuLight. Search on Bibsonomy ISPA/IUCC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
24Vetrivel Karuvandan, Senthamarai Chellamuthu, Shantharajah S. Periyasamy Cryptanalysis of AES-128 and AES-256 block ciphers using lorenz information measure. Search on Bibsonomy Int. Arab J. Inf. Technol. The full citation details ... 2016 DBLP  BibTeX  RDF
24Yuhao Wang 0002, Leibin Ni, Chip-Hong Chang, Hao Yu 0001 DW-AES: A Domain-Wall Nanowire-Based AES for High Throughput and Energy-Efficient Data Encryption in Non-Volatile Memory. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
24Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni 0001 Atomic-AES: A Compact Implementation of the AES Encryption/Decryption Core. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2016 DBLP  BibTeX  RDF
24Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni 0001 Atomic-AES: A Compact Implementation of the AES Encryption/Decryption Core. Search on Bibsonomy INDOCRYPT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
24Orr Dunkelman, Nathan Keller, Adi Shamir Improved Single-Key Attacks on 8-Round AES-192 and AES-256. Search on Bibsonomy J. Cryptol. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
24Guido Marco Bertoni, Lorenzo Grassi 0001, Filippo Melzani Simulations of Optical Emissions for Attacking AES and Masked AES. Search on Bibsonomy SPACE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
24Nadjia Anane, Mohamed Anane AES IP for hybrid cryptosystem RSA-AES. Search on Bibsonomy SSD The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
24Mona Dara, Kooroush Manochehri Using RC4 and AES Key Schedule to Generate Dynamic S-Box in AES. Search on Bibsonomy Inf. Secur. J. A Glob. Perspect. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
24Yoni De Mulder White-Box Cryptography: Analysis of White-Box AES Implementations (White-Box Cryptografie: Analyse van White-Box AES implementaties). (PDF / PS) Search on Bibsonomy 2014   RDF
24Pierre-Alain Fouque, Jérémy Jean, Thomas Peyrin Structural Evaluation of AES and Chosen-Key Distinguisher of 9-round AES-128. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2013 DBLP  BibTeX  RDF
24Suman Das Generation of AES-like 8-bit Random S-Box and Comparative Study on Randomness of Corresponding Ciphertexts with Other 8-bit AES S-Boxes. Search on Bibsonomy ICACNI The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
24Shay Gueron White Box AES Using Intel's New AES Instructions. Search on Bibsonomy ITNG The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
24Fabian Oboril, Ilias Sagar, Mehdi Baradaran Tahoori A-SOFT-AES: Self-adaptive software-implemented fault-tolerance for AES. Search on Bibsonomy IOLTS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
24Pierre-Alain Fouque, Jérémy Jean, Thomas Peyrin Structural Evaluation of AES and Chosen-Key Distinguisher of 9-Round AES-128. Search on Bibsonomy CRYPTO (1) The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
24Jérémy Jean Cryptanalysis of Symmetric-Key Primitives Based on the AES Block Cipher. (Cryptanalyse de primitives syme'triques base'es sur le chiffrement AES). Search on Bibsonomy 2013   RDF
24Patrick Derbez Meet-in-the-Middle Attacks on AES. (Attaques par Rencontre par le Milieu sur l'AES). Search on Bibsonomy 2013   RDF
24Krzysztof Jankowski, Pierre Laurent Packed AES-GCM Algorithm Suitable for AES/PCLMULQDQ Instructions. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
24David A. McGrew The Use of AES-192 and AES-256 in Secure RTP. Search on Bibsonomy RFC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
24Tatsuya Takehisa, Hiroki Nogawa, Masakatu Morii AES Flow Interception: Key Snooping Method on Virtual Machine - Exception Handling Attack for AES-NI -. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2011 DBLP  BibTeX  RDF
24Hao Wang, William Emmanuel Yu Comparison between PKI (RSA-AES) and AEAD (AES-EAX PSK) Cryptography Systems for Use in SMS-Based Secure Transmissions. Search on Bibsonomy NDT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
24Jianyong Huang, Willy Susilo, Jennifer Seberry Repeated Differential Properties of the AES-128 and AES-256 Key Schedules. Search on Bibsonomy TrustCom The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
24Orr Dunkelman, Nathan Keller, Adi Shamir Improved Single-Key Attacks on 8-Round AES-192 and AES-256. Search on Bibsonomy ASIACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
24Nidhal Selmane Global and local Fault attacks on AES cryptoprocessor : Implementation and Countermeasures. (Attaques en fautes globales et locales sur les cryptoprocesseurs AES : mise en œuvre et contremesures). Search on Bibsonomy 2010   RDF
24Wei Wang 0035, Xiaoyun Wang 0001, Guangwu Xu Impossible Differential Cryptanalysis of Pelican, MT-MAC-AES and PC-MAC-AES. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2009 DBLP  BibTeX  RDF
24Alex Biryukov, Dmitry Khovratovich Related-key Cryptanalysis of the Full AES-192 and AES-256. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2009 DBLP  BibTeX  RDF
24Russell Housley Using AES-CCM and AES-GCM Authenticated Encryption in the Cryptographic Message Syntax (CMS). Search on Bibsonomy RFC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Frank Vater, Peter Langendörfer An Area Efficient Realisation of AES for Wireless Devices (Eine flächeneffiziente AES Hardwarerealisierung für drahtlose Geräte). Search on Bibsonomy it Inf. Technol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Kazim Yumbul, Erkay Savas Efficient, secure, and isolated execution of cryptographic algorithms on a cryptographic unit. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF security, computer architecture, public key cryptography, instruction set extensions, cryptographic algorithms, aes
24Zheng Yuan, Wei Wang 0035, Keting Jia, Guangwu Xu, Xiaoyun Wang 0001 New Birthday Attacks on Some MACs Based on Block Ciphers. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF MAC, AES, Distinguishing attack, Impossible differential cryptanalysis, Forgery attack, Birthday attack
24Håvard Raddum, Igor A. Semaev Solving Multiple Right Hand Sides linear equations. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Multiple Right Hand Sides linear equations, AES, Algebraic attacks
24Piyush Kumar Shukla, Sanjay Silakari, Sarita Singh Bhadoria, Anuj Garg Multi-User FPGA - An Efficient Way of Managing Expensive FPGA Resources Using TCP/IP, Wi-Max/ Wi-Fi in a Secure Network Environment. Search on Bibsonomy ITNG The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Wi-Fi/ Wi-Max, NLOS, FPGA, AES, DES, Camellia, TDM
24Orr Dunkelman, Nathan Keller A New Attack on the LEX Stream Cipher. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF stream cipher design, AES, LEX
24Lars R. Knudsen, Vincent Rijmen Known-Key Distinguishers for Some Block Ciphers. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Distinguishing algorithms, Cryptanalysis, Block Cipher, AES, Feistel ciphers
24Ryad Benadjila, Olivier Billet, Stanislas Francfort Drm to counter side-channel attacks? Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2007 DBLP  DOI  BibTeX  RDF white-box, AES, side-channel attacks, DRM
24Bruno Robisson, Pascal Manet Differential Behavioral Analysis. Search on Bibsonomy CHES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Differential Behavioral Analysis, Safe-Error, Block Ciphers, AES, Differential Power Analysis, Fault Attacks
24Kuen-Cheng Chiang, Zhi-Wei Chen, Jean Jyh-Jiun Shann Design and implementation of a reconfigurable hardware for secure embedded systems. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF secured embedded system, AES, RSA, reconfigurable architecture, DES, processing element
24Thomas Baignères, Matthieu Finiasz Dial C for Cipher. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Blum-Blum-Shub generator, Block Cipher, AES, provable security, decorrelation
24Ezedin Barka, Emad Eldin Mohamed, Kadhim Hayawi End-to-end security solutions for WLAN: a performance analysis for the underlying encryption algorithms in the lightweight devices. Search on Bibsonomy IWCMC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF end-to-end wireless security, AES, J2ME, RC4, SSL/TLS
24Seok-Yong Jin, Jong-Min Baek, Hong-Yeop Song Improved Rijndael-Like S-Box and Its Transform Domain Analysis. Search on Bibsonomy SETA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Avalanche transform, AES, S-box, Rijndael, Hadamard transform
24Thanh-Ha Le, Jessy Clédière, Cécile Canovas, Bruno Robisson, Christine Servière, Jean-Louis Lacoume A Proposition for Correlation Power Analysis Enhancement. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF multi-bit DPA, PPA, AES, correlation, DPA, power analysis, DES, side channel, CPA
24Chen-Hsing Wang, Chih-Yen Lo, Min-Sheng Lee, Jen-Chieh Yeh, Chih-Tsun Huang, Cheng-Wen Wu, Shi-Yu Huang A network security processor design based on an integrated SOC design and test platform. Search on Bibsonomy DAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF HMAC-MD5, HMAC-SHA1, AES, RSA, AMBA, RNG
24Jacques J. A. Fournier, Simon W. Moore A Vector Approach to Cryptography Implementation. Search on Bibsonomy DRMTICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Cryptography, AES, RSA, vector architecture, Montgomery Modular Multiplication
24Gaël Rouvroy, François-Xavier Standaert, Frédéric Lefèbvre, Jean-Jacques Quisquater, Benoît Macq, Jean-Didier Legat Reconfigurable hardware solutions for the digital rights management of digital cinema. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2004 DBLP  DOI  BibTeX  RDF FPGA, watermarking, AES, DRM, JPEG 2000, digital cinema
24Hong-Su Cho, Soo Hak Sung, Daesung Kwon, Jung-Keun Lee, Jung Hwan Song, Jongin Lim 0001 New Method for Bounding the Maximum Differential Probability for SPNs and ARIA. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Substitution-permutation networks, Branch number, Independent variables, Cryptography, AES, Differential cryptanalysis, Linear cryptanalysis, ARIA
24Alex Biryukov, Christophe De Cannière, Michaël Quisquater On Multiple Linear Approximations. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF multiple linear approximations, stochastic systems of linear equations, maximum likelihood decoding, key-ranking, AES, DES, Linear cryptanalysis
24Eric Brier, Christophe Clavier, Francis Olivier Correlation Power Analysis with a Leakage Model. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Correlation factor, secure cryptographic device, AES, DPA, power analysis, DES, Hamming distance, side channel, CPA
24Máire McLoone, John V. McCanny Rijndael FPGA Implementations Utilising Look-Up Tables. Search on Bibsonomy J. VLSI Signal Process. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF encryption, AES, Rijndael, FPGA implementation
24Baodian Wei, Dongsu Liu, Xinmei Wang Activity Attack on Rijndael . Search on Bibsonomy AINA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Rijndael Algorithm, Cryptanalysis, AES, Birthday Paradox
24Nicolas T. Courtois, Josef Pieprzyk Cryptanalysis of Block Ciphers with Overdefined Systems of Equations. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF MQ problem, overdefined systems of multivariate equations, Gröbner bases, sparse multivariate polynomials, Multivariate Cryptanalysis, Block ciphers, AES, Rijndael, Square, Camellia, Serpent, XL algorithm, multivariate quadratic equations
24Srivaths Ravi 0001, Anand Raghunathan, Nachiketh R. Potlapally, Murugan Sankaradass System design methodologies for a wireless security processing platform. Search on Bibsonomy DAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF security, performance, embedded system, wireless, encryption, AES, RSA, design methodology, system architecture, platform, DES, IPSec, SSL, decryption, handset, 3DES, security processing
24Pawel Chodowiec, Po Khuon, Kris Gaj Fast implementations of secret-key block ciphers using mixed inner- and outer-round pipelining. Search on Bibsonomy FPGA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF fast architectures, secret-key ciphers, pipelining, AES
24Takahide Sakata, Hideyuki Takahashi, Tetsu Sekine, Toshiya Ogiwara Investigation of Ga Contamination Due to Analysis by Dual Beam FIB. Search on Bibsonomy Asian Test Symposium The full citation details ... 1999 DBLP  DOI  BibTeX  RDF FIB, Gallium contamination, Silicon wafer, Ion milling, TRXRF, XPS, WDX, ICP-MS, AES
23Thomas Popp, Mario Kirschbaum, Stefan Mangard Practical Attacks on Masked Hardware. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF DPA-Resistant Masked Logic Styles, MDPL, Prototype Chip, Hardware AES, PDF-Attack, PRNG
23Renfei Liu, Keshab K. Parhi Fast composite field S-box architectures for advanced encryption standard. Search on Bibsonomy ACM Great Lakes Symposium on VLSI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF advanced encryption standard (aes), composite finite field, s-box, precomputation
21Tilo Müller, Andreas Dewald, Felix C. Freiling AESSE: a cold-boot resistant implementation of AES. Search on Bibsonomy EUROSEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF cold boot attacks, streaming SIMD extensions, advanced encryption standard, Linux kernel
21Liang Li, Jun Han 0003, Xiaoyang Zeng, Jia Zhao A full-custom design of AES SubByte module with signal independent power consumption. Search on Bibsonomy ISCAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Jiping Niu, Yongchuan Zhang, Zhihua Hu, Zuqiao Yang A Digital Image Scrambling Method Based on AES and Error-Correcting Code. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Yi Xin Su, Jimson Mathew, Jawar Singh, Dhiraj K. Pradhan Pseudo parallel architecture for AES with error correction. Search on Bibsonomy SoCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Robert Könighofer A Fast and Cache-Timing Resistant Implementation of the AES. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Stefan Tillich, Christoph Herbst Attacking State-of-the-Art Software Countermeasures-A Case Study for AES. Search on Bibsonomy CHES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF software countermeasures, operation randomization, advanced DPA attacks, smart card, Advanced Encryption Standard, side channel attacks, power analysis, masking
21Claudio Mucci, Luca Vanzolini, Fabio Campi, Mario Toma Interactive presentation: Implementation of AES/Rijndael on a dynamically reconfigurable architecture. Search on Bibsonomy DATE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Ralf Laue 0002, Oliver Kelm, Sebastian Schipp, Abdulhadi Shoufan, Sorin A. Huss Compact AES-based Architecture for Symmetric Encryption, Hash Function, and Random Number Generation. Search on Bibsonomy FPL The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Hua Li, Jianzhou Li A New Compact Architecture for AES with Optimized ShiftRows Operation. Search on Bibsonomy ISCAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Olivier Faurax, Assia Tria, Laurent Freund, Frédéric Bancel Robustness of circuits under delay-induced faults : test of AES with the PAFI tool. Search on Bibsonomy IOLTS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Kundan Kumar, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury Design of a Differential Power Analysis Resistant Masked AES S-Box. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Stefan Tillich, Johann Großschädl Power Analysis Resistant AES Implementation with Instruction Set Extensions. Search on Bibsonomy CHES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF embedded RISC processor, SPARC V8 architecture, SCA resistance, Advanced Encryption Standard, power analysis, instruction set extensions
21 Data Encryption Standard (DES) and Advanced Encryption Standard (AES). Search on Bibsonomy Encyclopedia of Multimedia The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Jacques J. A. Fournier, Michael Tunstall Cache Based Power Analysis Attacks on AES. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Tim Good, Mohammed Benaissa AES as stream cipher on a small FPGA. Search on Bibsonomy ISCAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Ignacio Algredo-Badillo, Claudia Feregrino Uribe, René Cumplido Design and Implementation of an FPGA-Based 1.452-Gbps Non-pipelined AES Architecture. Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Naga M. Kosaraju, Murali R. Varanasi, Saraju P. Mohanty A High-Performance VLSI Architecture for Advanced Encryption Standard (AES) Algorithm. Search on Bibsonomy VLSI Design The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
Displaying result #301 - #400 of 2665 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license