|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1145 occurrences of 417 keywords
|
|
|
Results
Found 2665 publication records. Showing 2665 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
26 | Kris Gaj, Pawel Chodowiec |
Fast Implementation and Fair Comparison of the Final Candidates for Advanced Encryption Standard Using Field Programmable Gate Arrays. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2001, The Cryptographer's Track at RSA Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings, pp. 84-99, 2001, Springer, 3-540-41898-9. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
26 | Louis Granboulan, Phong Q. Nguyen, Fabrice Noilhan, Serge Vaudenay |
DFCv2. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 7th Annual International Workshop, SAC 2000, Waterloo, Ontario, Canada, August 14-15, 2000, Proceedings, pp. 57-71, 2000, Springer, 3-540-42069-X. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
26 | Adam J. Elbirt, Christof Paar |
An FPGA implementation and performance evaluation of the Serpent block cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPGA ![In: Proceedings of the ACM/SIGDA International Symposium on Field Programmable Gate Arrays, FPGA 2000, Monterey, CA, USA, February 10-11, 2000, pp. 33-40, 2000, ACM, 1-58113-193-3. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
algorithm-agility, FPGA, cryptography, VHDL, block cipher |
24 | Russ Housley, Hannes Tschofenig |
CBOR Object Signing and Encryption (COSE): AES-CTR and AES-CBC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 9459, pp. 1-10, September 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Xiaoyang Dong, Shun Li, Phuong Pham |
Chosen-Key Distinguishing Attacks on Full AES-192, AES-256, Kiasu-BC, and More. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 1095, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
24 | Udai Wasmi Abboud, Moceheb Lazam Shuwandy |
SDA Plus: Improving the Performance of the System Determine Algorithm (SDA) of the Switching Between AES-128 and AES-256 (MOLAZ Method). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSET ![In: 13th IEEE International Conference on System Engineering and Technology, ICSET 2023, Shah Alam, Malaysia, October 2, 2023, pp. 61-65, 2023, IEEE, 979-8-3503-4089-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Virginia Zúñiga-González, Erica Tena-Sánchez, Antonio J. Acosta 0001 |
A Security Comparison between AES-128 and AES-256 FPGA implementations against DPA attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DCIS ![In: 38th Conference on Design of Circuits and Integrated Systems, DCIS 2023, Málaga, Spain, November 15-17, 2023, pp. 1-6, 2023, IEEE, 979-8-3503-0385-8. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Xinfei Guo, Mohamed El-Hadedy 0001, Sergiu Mosanu, Xiangdong Wei, Kevin Skadron, Mircea R. Stan |
Agile-AES: Implementation of configurable AES primitive with agile design approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Integr. ![In: Integr. 85, pp. 87-96, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
24 | SeongHan Shin, Shota Yamada 0001, Goichiro Hanaoka, Yusuke Ishida, Atsushi Kunii, Junichi Oketani, Shimpei Kunii, Kiyoshi Tomomura |
How to Extend CTRT for AES-256 and AES-192. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 105-A(8), pp. 1121-1133, August 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Wai-Kong Lee, Hwajeong Seo, Seog Chung Seo, Seong Oun Hwang |
Efficient Implementation of AES-CTR and AES-ECB on GPUs With Applications for High-Speed FrodoKEM and Exhaustive Key Search. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Circuits Syst. II Express Briefs ![In: IEEE Trans. Circuits Syst. II Express Briefs 69(6), pp. 2962-2966, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Cavidan Yakupoglu, Kurt Rohloff |
PREFHE, PREFHE-AES and PREFHE-SGX: Secure Multiparty Computation Protocols from Fully Homomorphic Encryption and Proxy ReEncryption with AES and Intel SGX. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Security and Privacy in Communication Networks - 18th EAI International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings, pp. 819-837, 2022, Springer, 978-3-031-25537-3. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Yusuke Naito 0001, Yu Sasaki, Takeshi Sugawara 0001 |
AES-LBBB: AES Mode for Lightweight and BBB-Secure Authenticated Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Trans. Cryptogr. Hardw. Embed. Syst. ![In: IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(3), pp. 298-333, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
24 | Alexandre Adomnicai, Thomas Peyrin |
Fixslicing AES-like Ciphers New bitsliced AES speed records on ARM-Cortex M and RISC-V. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Trans. Cryptogr. Hardw. Embed. Syst. ![In: IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(1), pp. 402-425, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
24 | S. Srisakthi, A. P. Shanthi |
Towards the Design of a Stronger AES: AES with Key Dependent Shift Rows (KDSR). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Pers. Commun. ![In: Wirel. Pers. Commun. 114(4), pp. 3003-3015, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
24 | Alexandre Adomnicai, Thomas Peyrin |
Fixslicing AES-like Ciphers: New bitsliced AES speed records on ARM-Cortex M and RISC-V. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2020, pp. 1123, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
24 | John Preuß Mattsson, Daniel Migault |
ECDHE_PSK with AES-GCM and AES-CCM Cipher Suites for TLS 1.2 and DTLS 1.2. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 8442, pp. 1-7, September 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
24 | Rahul Saha, G. Geetha 0001, Gulshan Kumar, Tai-Hoon Kim |
RK-AES: An Improved Version of AES Using a New Key Generation Process with Random Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 2018, pp. 9802475:1-9802475:11, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
24 | Felix Wegener, Amir Moradi 0001 |
Yet Another Size Record for AES: A First-Order SCA Secure AES S-box Based on GF(28) Multiplication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2018, pp. 1074, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
24 | Ben Lapid, Avishai Wool |
Cache-Attacks on the ARM TrustZone implementations of AES-256 and AES-256-GCM via GPU-based analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2018, pp. 621, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
24 | Guido Marco Bertoni, Lorenzo Grassi 0001, Filippo Melzani |
Simulations of Optical Emissions for Attacking AES and Masked AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2018, pp. 291, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
24 | Nir Drucker, Shay Gueron, Vlad Krasnov |
Making AES great again: the forthcoming vectorized AES instruction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2018, pp. 392, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
24 | Yong Zhang, Ning Wu, Fang Zhou 0001, Xiaoqiang Zhang 0001, Jinbao Zhang 0002 |
High performance AES-GCM implementation based on efficient AES and FR-KOA multiplier. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Electron. Express ![In: IEICE Electron. Express 15(14), pp. 20180559, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
24 | Ben Lapid, Avishai Wool |
Cache-Attacks on the ARM TrustZone Implementations of AES-256 and AES-256-GCM via GPU-Based Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Selected Areas in Cryptography - SAC 2018 - 25th International Conference, Calgary, AB, Canada, August 15-17, 2018, Revised Selected Papers, pp. 235-256, 2018, Springer, 978-3-030-10969-1. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
24 | Amandeep Singh, Praveen Agarwal, Mehar Chand |
A Comparative Study of Audio Encryption Analysis Using Dynamic AES and Standard AES Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOFA (2) ![In: Soft Computing Applications - Proceedings of the 8th International Workshop Soft Computing Applications (SOFA 2018), Vol. II, Romania, 13-15 September 2018, pp. 241-249, 2018, Springer, 978-3-030-52189-9. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
24 | Felix Wegener, Amir Moradi 0001 |
Yet Another Size Record for AES: A First-Order SCA Secure AES S-Box Based on \(\mathrm {GF}(2^8)\) Multiplication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CARDIS ![In: Smart Card Research and Advanced Applications, 17th International Conference, CARDIS 2018, Montpellier, France, November 12-14, 2018, Revised Selected Papers., pp. 111-124, 2018, Springer, 978-3-030-15461-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
24 | Mustafa Khairallah, Anupam Chattopadhyay, Thomas Peyrin |
Looting the LUTs : FPGA Optimization of AES and AES-like Ciphers for Authenticated Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2017, pp. 1019, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
24 | Sandhya Koteshwara, Amitabh Das, Keshab K. Parhi |
Performance comparison of AES-GCM-SIV and AES-GCM algorithms for authenticated encryption on FPGA platforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSSC ![In: 51st Asilomar Conference on Signals, Systems, and Computers, ACSSC 2017, Pacific Grove, CA, USA, October 29 - November 1, 2017, pp. 1331-1336, 2017, IEEE, 978-1-5386-1823-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
24 | Mustafa Khairallah, Anupam Chattopadhyay, Thomas Peyrin |
Looting the LUTs: FPGA Optimization of AES and AES-like Ciphers for Authenticated Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2017 - 18th International Conference on Cryptology in India, Chennai, India, December 10-13, 2017, Proceedings, pp. 282-301, 2017, Springer, 978-3-319-71666-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
24 | Liandeng Li, Jiarui Fang, Jinlei Jiang, Lin Gan, Weijie Zheng 0001, Haohuan Fu, Guangwen Yang |
SW-AES: Accelerating AES Algorithm on the Sunway TaihuLight. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPA/IUCC ![In: 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), Guangzhou, China, December 12-15, 2017, pp. 1204-1211, 2017, IEEE, 978-1-5386-3790-6. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
24 | Vetrivel Karuvandan, Senthamarai Chellamuthu, Shantharajah S. Periyasamy |
Cryptanalysis of AES-128 and AES-256 block ciphers using lorenz information measure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. Arab J. Inf. Technol. ![In: Int. Arab J. Inf. Technol. 13(6B), pp. 1054-1060, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
24 | Yuhao Wang 0002, Leibin Ni, Chip-Hong Chang, Hao Yu 0001 |
DW-AES: A Domain-Wall Nanowire-Based AES for High Throughput and Energy-Efficient Data Encryption in Non-Volatile Memory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 11(11), pp. 2426-2440, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
24 | Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni 0001 |
Atomic-AES: A Compact Implementation of the AES Encryption/Decryption Core. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2016, pp. 927, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
24 | Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni 0001 |
Atomic-AES: A Compact Implementation of the AES Encryption/Decryption Core. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2016 - 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings, pp. 173-190, 2016, 978-3-319-49889-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
24 | Orr Dunkelman, Nathan Keller, Adi Shamir |
Improved Single-Key Attacks on 8-Round AES-192 and AES-256. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 28(3), pp. 397-422, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
24 | Guido Marco Bertoni, Lorenzo Grassi 0001, Filippo Melzani |
Simulations of Optical Emissions for Attacking AES and Masked AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPACE ![In: Security, Privacy, and Applied Cryptography Engineering - 5th International Conference, SPACE 2015, Jaipur, India, October 3-7, 2015, Proceedings, pp. 172-189, 2015, Springer, 978-3-319-24125-8. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
24 | Nadjia Anane, Mohamed Anane |
AES IP for hybrid cryptosystem RSA-AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSD ![In: 12th IEEE International Multi-Conference on Systems, Signals & Devices, SSD 2015, Mahdia, Tunisia, March 16-19, 2015, pp. 1-6, 2015, IEEE, 978-1-4799-1758-7. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
24 | Mona Dara, Kooroush Manochehri |
Using RC4 and AES Key Schedule to Generate Dynamic S-Box in AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Secur. J. A Glob. Perspect. ![In: Inf. Secur. J. A Glob. Perspect. 23(1-2), pp. 1-9, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
24 | Yoni De Mulder |
White-Box Cryptography: Analysis of White-Box AES Implementations (White-Box Cryptografie: Analyse van White-Box AES implementaties). (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2014 |
RDF |
|
24 | Pierre-Alain Fouque, Jérémy Jean, Thomas Peyrin |
Structural Evaluation of AES and Chosen-Key Distinguisher of 9-round AES-128. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2013, pp. 366, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
24 | Suman Das |
Generation of AES-like 8-bit Random S-Box and Comparative Study on Randomness of Corresponding Ciphertexts with Other 8-bit AES S-Boxes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICACNI ![In: Intelligent Computing, Networking, and Informatics, Proceedings of the International Conference on Advanced Computing, Networking, and Informatics, ICACNI 2013, Raipur, Chhattisgarh, India, 12-14 June 2013, pp. 303-318, 2013, Springer, 978-81-322-1664-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
24 | Shay Gueron |
White Box AES Using Intel's New AES Instructions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Tenth International Conference on Information Technology: New Generations, ITNG 2013, 15-17 April, 2013, Las Vegas, Nevada, USA, pp. 417-421, 2013, IEEE Computer Society, 978-0-7695-4967-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
24 | Fabian Oboril, Ilias Sagar, Mehdi Baradaran Tahoori |
A-SOFT-AES: Self-adaptive software-implemented fault-tolerance for AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IOLTS ![In: 2013 IEEE 19th International On-Line Testing Symposium (IOLTS), Chania, Crete, Greece, July 8-10, 2013, pp. 104-109, 2013, IEEE, 978-1-4799-0662-8. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
24 | Pierre-Alain Fouque, Jérémy Jean, Thomas Peyrin |
Structural Evaluation of AES and Chosen-Key Distinguisher of 9-Round AES-128. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO (1) ![In: Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part I, pp. 183-203, 2013, Springer, 978-3-642-40040-7. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
24 | Jérémy Jean |
Cryptanalysis of Symmetric-Key Primitives Based on the AES Block Cipher. (Cryptanalyse de primitives syme'triques base'es sur le chiffrement AES). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2013 |
RDF |
|
24 | Patrick Derbez |
Meet-in-the-Middle Attacks on AES. (Attaques par Rencontre par le Milieu sur l'AES). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2013 |
RDF |
|
24 | Krzysztof Jankowski, Pierre Laurent |
Packed AES-GCM Algorithm Suitable for AES/PCLMULQDQ Instructions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 60(1), pp. 135-138, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
24 | David A. McGrew |
The Use of AES-192 and AES-256 in Secure RTP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 6188, pp. 1-16, March 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
24 | Tatsuya Takehisa, Hiroki Nogawa, Masakatu Morii |
AES Flow Interception: Key Snooping Method on Virtual Machine - Exception Handling Attack for AES-NI -. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2011, pp. 428, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
24 | Hao Wang, William Emmanuel Yu |
Comparison between PKI (RSA-AES) and AEAD (AES-EAX PSK) Cryptography Systems for Use in SMS-Based Secure Transmissions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NDT ![In: Networked Digital Technologies - Third International Conference, NDT 2011, Macau, China, July 11-13, 2011. Proceedings, pp. 1-12, 2011, Springer, 978-3-642-22184-2. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
24 | Jianyong Huang, Willy Susilo, Jennifer Seberry |
Repeated Differential Properties of the AES-128 and AES-256 Key Schedules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, Changsha, China, 16-18 November, 2011, pp. 525-532, 2011, IEEE Computer Society, 978-1-4577-2135-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
24 | Orr Dunkelman, Nathan Keller, Adi Shamir |
Improved Single-Key Attacks on 8-Round AES-192 and AES-256. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings, pp. 158-176, 2010, Springer, 978-3-642-17372-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Nidhal Selmane |
Global and local Fault attacks on AES cryptoprocessor : Implementation and Countermeasures. (Attaques en fautes globales et locales sur les cryptoprocesseurs AES : mise en œuvre et contremesures). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2010 |
RDF |
|
24 | Wei Wang 0035, Xiaoyun Wang 0001, Guangwu Xu |
Impossible Differential Cryptanalysis of Pelican, MT-MAC-AES and PC-MAC-AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2009, pp. 5, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
24 | Alex Biryukov, Dmitry Khovratovich |
Related-key Cryptanalysis of the Full AES-192 and AES-256. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2009, pp. 317, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
24 | Russell Housley |
Using AES-CCM and AES-GCM Authenticated Encryption in the Cryptographic Message Syntax (CMS). ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 5084, pp. 1-11, November 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Frank Vater, Peter Langendörfer |
An Area Efficient Realisation of AES for Wireless Devices (Eine flächeneffiziente AES Hardwarerealisierung für drahtlose Geräte). ![Search on Bibsonomy](Pics/bibsonomy.png) |
it Inf. Technol. ![In: it Inf. Technol. 49(3), pp. 188-, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Kazim Yumbul, Erkay Savas |
Efficient, secure, and isolated execution of cryptographic algorithms on a cryptographic unit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 143-151, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
security, computer architecture, public key cryptography, instruction set extensions, cryptographic algorithms, aes |
24 | Zheng Yuan, Wei Wang 0035, Keting Jia, Guangwu Xu, Xiaoyun Wang 0001 |
New Birthday Attacks on Some MACs Based on Block Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings, pp. 209-230, 2009, Springer, 978-3-642-03355-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
MAC, AES, Distinguishing attack, Impossible differential cryptanalysis, Forgery attack, Birthday attack |
24 | Håvard Raddum, Igor A. Semaev |
Solving Multiple Right Hand Sides linear equations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 49(1-3), pp. 147-160, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Multiple Right Hand Sides linear equations, AES, Algebraic attacks |
24 | Piyush Kumar Shukla, Sanjay Silakari, Sarita Singh Bhadoria, Anuj Garg |
Multi-User FPGA - An Efficient Way of Managing Expensive FPGA Resources Using TCP/IP, Wi-Max/ Wi-Fi in a Secure Network Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Fifth International Conference on Information Technology: New Generations (ITNG 2008), 7-8 April 2008, Las Vegas, Nevada, USA, pp. 609-614, 2008, IEEE Computer Society, 978-0-7695-3099-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Wi-Fi/ Wi-Max, NLOS, FPGA, AES, DES, Camellia, TDM |
24 | Orr Dunkelman, Nathan Keller |
A New Attack on the LEX Stream Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings, pp. 539-556, 2008, Springer, 978-3-540-89254-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
stream cipher design, AES, LEX |
24 | Lars R. Knudsen, Vincent Rijmen |
Known-Key Distinguishers for Some Block Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings, pp. 315-324, 2007, Springer, 978-3-540-76899-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Distinguishing algorithms, Cryptanalysis, Block Cipher, AES, Feistel ciphers |
24 | Ryad Benadjila, Olivier Billet, Stanislas Francfort |
Drm to counter side-channel attacks? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Rights Management Workshop ![In: Proceedings of the Seventh ACM Workshop on Digital Rights Management, Alexandria, VA, USA, October 29, 2007, pp. 23-32, 2007, ACM, 978-1-59593-884-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
white-box, AES, side-channel attacks, DRM |
24 | Bruno Robisson, Pascal Manet |
Differential Behavioral Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings, pp. 413-426, 2007, Springer, 978-3-540-74734-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Differential Behavioral Analysis, Safe-Error, Block Ciphers, AES, Differential Power Analysis, Fault Attacks |
24 | Kuen-Cheng Chiang, Zhi-Wei Chen, Jean Jyh-Jiun Shann |
Design and implementation of a reconfigurable hardware for secure embedded systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, Taipei, Taiwan, March 21-24, 2006, pp. 364, 2006, ACM, 1-59593-272-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
secured embedded system, AES, RSA, reconfigurable architecture, DES, processing element |
24 | Thomas Baignères, Matthieu Finiasz |
Dial C for Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers, pp. 76-95, 2006, Springer, 978-3-540-74461-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Blum-Blum-Shub generator, Block Cipher, AES, provable security, decorrelation |
24 | Ezedin Barka, Emad Eldin Mohamed, Kadhim Hayawi |
End-to-end security solutions for WLAN: a performance analysis for the underlying encryption algorithms in the lightweight devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the International Conference on Wireless Communications and Mobile Computing, IWCMC 2006, Vancouver, British Columbia, Canada, July 3-6, 2006, pp. 1295-1300, 2006, ACM, 1-59593-306-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
end-to-end wireless security, AES, J2ME, RC4, SSL/TLS |
24 | Seok-Yong Jin, Jong-Min Baek, Hong-Yeop Song |
Improved Rijndael-Like S-Box and Its Transform Domain Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SETA ![In: Sequences and Their Applications - SETA 2006, 4th International Conference, Beijing, China, September 24-28, 2006, Proceedings, pp. 153-167, 2006, Springer, 3-540-44523-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Avalanche transform, AES, S-box, Rijndael, Hadamard transform |
24 | Thanh-Ha Le, Jessy Clédière, Cécile Canovas, Bruno Robisson, Christine Servière, Jean-Louis Lacoume |
A Proposition for Correlation Power Analysis Enhancement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings, pp. 174-186, 2006, Springer, 3-540-46559-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
multi-bit DPA, PPA, AES, correlation, DPA, power analysis, DES, side channel, CPA |
24 | Chen-Hsing Wang, Chih-Yen Lo, Min-Sheng Lee, Jen-Chieh Yeh, Chih-Tsun Huang, Cheng-Wen Wu, Shi-Yu Huang |
A network security processor design based on an integrated SOC design and test platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DAC ![In: Proceedings of the 43rd Design Automation Conference, DAC 2006, San Francisco, CA, USA, July 24-28, 2006, pp. 490-495, 2006, ACM, 1-59593-381-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
HMAC-MD5, HMAC-SHA1, AES, RSA, AMBA, RNG |
24 | Jacques J. A. Fournier, Simon W. Moore |
A Vector Approach to Cryptography Implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DRMTICS ![In: Digital Rights Management: Technologies, Issues, Challenges and Systems, First International Conference, DRMTICS 2005, Sydney, Australia, October 31 - November 2, 2005, Revised Selected Papers, pp. 277-297, 2005, Springer, 3-540-35998-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Cryptography, AES, RSA, vector architecture, Montgomery Modular Multiplication |
24 | Gaël Rouvroy, François-Xavier Standaert, Frédéric Lefèbvre, Jean-Jacques Quisquater, Benoît Macq, Jean-Didier Legat |
Reconfigurable hardware solutions for the digital rights management of digital cinema. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Rights Management Workshop ![In: Proceedings of the 2004 ACM Workshop on Digital Rights Management 2004, Washington, DC, USA, October 25, 2004, pp. 40-53, 2004, ACM, 1-58113-969-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
FPGA, watermarking, AES, DRM, JPEG 2000, digital cinema |
24 | Hong-Su Cho, Soo Hak Sung, Daesung Kwon, Jung-Keun Lee, Jung Hwan Song, Jongin Lim 0001 |
New Method for Bounding the Maximum Differential Probability for SPNs and ARIA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers, pp. 21-32, 2004, Springer, 3-540-26226-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Substitution-permutation networks, Branch number, Independent variables, Cryptography, AES, Differential cryptanalysis, Linear cryptanalysis, ARIA |
24 | Alex Biryukov, Christophe De Cannière, Michaël Quisquater |
On Multiple Linear Approximations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2004, 24th Annual International CryptologyConference, Santa Barbara, California, USA, August 15-19, 2004, Proceedings, pp. 1-22, 2004, Springer, 3-540-22668-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
multiple linear approximations, stochastic systems of linear equations, maximum likelihood decoding, key-ranking, AES, DES, Linear cryptanalysis |
24 | Eric Brier, Christophe Clavier, Francis Olivier |
Correlation Power Analysis with a Leakage Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings, pp. 16-29, 2004, Springer, 3-540-22666-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Correlation factor, secure cryptographic device, AES, DPA, power analysis, DES, Hamming distance, side channel, CPA |
24 | Máire McLoone, John V. McCanny |
Rijndael FPGA Implementations Utilising Look-Up Tables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. VLSI Signal Process. ![In: J. VLSI Signal Process. 34(3), pp. 261-275, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
encryption, AES, Rijndael, FPGA implementation |
24 | Baodian Wei, Dongsu Liu, Xinmei Wang |
Activity Attack on Rijndael . ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 17th International Conference on Advanced Information Networking and Applications (AINA'03), March 27-29, 2003, Xi'an, China, pp. 803-806, 2003, IEEE Computer Society, 0-7695-1906-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Rijndael Algorithm, Cryptanalysis, AES, Birthday Paradox |
24 | Nicolas T. Courtois, Josef Pieprzyk |
Cryptanalysis of Block Ciphers with Overdefined Systems of Equations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings, pp. 267-287, 2002, Springer, 3-540-00171-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
MQ problem, overdefined systems of multivariate equations, Gröbner bases, sparse multivariate polynomials, Multivariate Cryptanalysis, Block ciphers, AES, Rijndael, Square, Camellia, Serpent, XL algorithm, multivariate quadratic equations |
24 | Srivaths Ravi 0001, Anand Raghunathan, Nachiketh R. Potlapally, Murugan Sankaradass |
System design methodologies for a wireless security processing platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DAC ![In: Proceedings of the 39th Design Automation Conference, DAC 2002, New Orleans, LA, USA, June 10-14, 2002, pp. 777-782, 2002, ACM, 1-58113-461-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
security, performance, embedded system, wireless, encryption, AES, RSA, design methodology, system architecture, platform, DES, IPSec, SSL, decryption, handset, 3DES, security processing |
24 | Pawel Chodowiec, Po Khuon, Kris Gaj |
Fast implementations of secret-key block ciphers using mixed inner- and outer-round pipelining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPGA ![In: Proceedings of the ACM/SIGDA International Symposium on Field Programmable Gate Arrays, FPGA 2001, Monterey, CA, USA, February 11-13, 2001, pp. 94-102, 2001, ACM, 1-58113-341-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
fast architectures, secret-key ciphers, pipelining, AES |
24 | Takahide Sakata, Hideyuki Takahashi, Tetsu Sekine, Toshiya Ogiwara |
Investigation of Ga Contamination Due to Analysis by Dual Beam FIB. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Asian Test Symposium ![In: 8th Asian Test Symposium (ATS '99), 16-18 November 1999, Shanghai, China, pp. 389-393, 1999, IEEE Computer Society, 0-7695-0315-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
FIB, Gallium contamination, Silicon wafer, Ion milling, TRXRF, XPS, WDX, ICP-MS, AES |
23 | Thomas Popp, Mario Kirschbaum, Stefan Mangard |
Practical Attacks on Masked Hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2009, The Cryptographers' Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings, pp. 211-225, 2009, Springer, 978-3-642-00861-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
DPA-Resistant Masked Logic Styles, MDPL, Prototype Chip, Hardware AES, PDF-Attack, PRNG |
23 | Renfei Liu, Keshab K. Parhi |
Fast composite field S-box architectures for advanced encryption standard. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Great Lakes Symposium on VLSI ![In: Proceedings of the 18th ACM Great Lakes Symposium on VLSI 2008, Orlando, Florida, USA, May 4-6, 2008, pp. 65-70, 2008, ACM, 978-1-59593-999-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
advanced encryption standard (aes), composite finite field, s-box, precomputation |
21 | Tilo Müller, Andreas Dewald, Felix C. Freiling |
AESSE: a cold-boot resistant implementation of AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROSEC ![In: Proceedings of the Third European Workshop on System Security, EUROSEC 2010, Paris, France, April 13, 2010, pp. 42-47, 2010, ACM, 978-1-4503-0059-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
cold boot attacks, streaming SIMD extensions, advanced encryption standard, Linux kernel |
21 | Liang Li, Jun Han 0003, Xiaoyang Zeng, Jia Zhao |
A full-custom design of AES SubByte module with signal independent power consumption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS ![In: International Symposium on Circuits and Systems (ISCAS 2008), 18-21 May 2008, Sheraton Seattle Hotel, Seattle, Washington, USA, pp. 3302-3305, 2008, IEEE, 978-1-4244-1683-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Jiping Niu, Yongchuan Zhang, Zhihua Hu, Zuqiao Yang |
A Digital Image Scrambling Method Based on AES and Error-Correcting Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (3) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China, pp. 677-680, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Yi Xin Su, Jimson Mathew, Jawar Singh, Dhiraj K. Pradhan |
Pseudo parallel architecture for AES with error correction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SoCC ![In: 21st Annual IEEE International SoC Conference, SoCC 2008, September 17-20, 2008, Radisson Hotel, Newport Beach, CA, USA, Proceedings, pp. 187-190, 2008, IEEE, 978-1-4244-2596-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Robert Könighofer |
A Fast and Cache-Timing Resistant Implementation of the AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2008, The Cryptographers' Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings, pp. 187-202, 2008, Springer, 978-3-540-79262-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Stefan Tillich, Christoph Herbst |
Attacking State-of-the-Art Software Countermeasures-A Case Study for AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings, pp. 228-243, 2008, Springer, 978-3-540-85052-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
software countermeasures, operation randomization, advanced DPA attacks, smart card, Advanced Encryption Standard, side channel attacks, power analysis, masking |
21 | Claudio Mucci, Luca Vanzolini, Fabio Campi, Mario Toma |
Interactive presentation: Implementation of AES/Rijndael on a dynamically reconfigurable architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DATE ![In: 2007 Design, Automation and Test in Europe Conference and Exposition, DATE 2007, Nice, France, April 16-20, 2007, pp. 355-360, 2007, EDA Consortium, San Jose, CA, USA, 978-3-9810801-2-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Ralf Laue 0002, Oliver Kelm, Sebastian Schipp, Abdulhadi Shoufan, Sorin A. Huss |
Compact AES-based Architecture for Symmetric Encryption, Hash Function, and Random Number Generation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPL ![In: FPL 2007, International Conference on Field Programmable Logic and Applications, Amsterdam, The Netherlands, 27-29 August 2007, pp. 480-484, 2007, IEEE, 1-4244-1060-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Hua Li, Jianzhou Li |
A New Compact Architecture for AES with Optimized ShiftRows Operation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS ![In: International Symposium on Circuits and Systems (ISCAS 2007), 27-20 May 2007, New Orleans, Louisiana, USA, pp. 1851-1854, 2007, IEEE, 1-4244-0920-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Olivier Faurax, Assia Tria, Laurent Freund, Frédéric Bancel |
Robustness of circuits under delay-induced faults : test of AES with the PAFI tool. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IOLTS ![In: 13th IEEE International On-Line Testing Symposium (IOLTS 2007), 8-11 July 2007, Heraklion, Crete, Greece, pp. 185-186, 2007, IEEE Computer Society, 0-7695-2918-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Kundan Kumar, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury |
Design of a Differential Power Analysis Resistant Masked AES S-Box. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2007, 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings, pp. 373-383, 2007, Springer, 978-3-540-77025-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Stefan Tillich, Johann Großschädl |
Power Analysis Resistant AES Implementation with Instruction Set Extensions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings, pp. 303-319, 2007, Springer, 978-3-540-74734-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
embedded RISC processor, SPARC V8 architecture, SCA resistance, Advanced Encryption Standard, power analysis, instruction set extensions |
21 | |
Data Encryption Standard (DES) and Advanced Encryption Standard (AES). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Multimedia ![In: Encyclopedia of Multimedia, 2006, Springer, 978-0-387-24395-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Jacques J. A. Fournier, Michael Tunstall |
Cache Based Power Analysis Attacks on AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings, pp. 17-28, 2006, Springer, 3-540-35458-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Tim Good, Mohammed Benaissa |
AES as stream cipher on a small FPGA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS ![In: International Symposium on Circuits and Systems (ISCAS 2006), 21-24 May 2006, Island of Kos, Greece, 2006, IEEE, 0-7803-9389-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Ignacio Algredo-Badillo, Claudia Feregrino Uribe, René Cumplido |
Design and Implementation of an FPGA-Based 1.452-Gbps Non-pipelined AES Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (3) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part III, pp. 456-465, 2006, Springer, 3-540-34075-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Naga M. Kosaraju, Murali R. Varanasi, Saraju P. Mohanty |
A High-Performance VLSI Architecture for Advanced Encryption Standard (AES) Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLSI Design ![In: 19th International Conference on VLSI Design (VLSI Design 2006), 3-7 January 2006, Hyderabad, India, pp. 481-484, 2006, IEEE Computer Society, 0-7695-2502-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
Displaying result #301 - #400 of 2665 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ >>] |
|