|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 5495 occurrences of 1765 keywords
|
|
|
Results
Found 21739 publication records. Showing 21739 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
30 | Nam-Su Jho, Eun Sun Yoo, Jung Hee Cheon, Myung-Hwan Kim |
New broadcast encryption scheme using tree-based circle. |
Digital Rights Management Workshop |
2005 |
DBLP DOI BibTeX RDF |
punctured interval, broadcast encryption, tree structure, cascade |
30 | Yuliang Zheng 0001, Yongge Wang |
Efficient and provably secure ciphers for storage device block level encryption. |
StorageSS |
2005 |
DBLP DOI BibTeX RDF |
storage device encryption, hash function, symmetric cipher |
30 | Eric Corndorf, Chuang Liang, Gregory S. Kanter, Prem Kumar, Horace P. Yuen |
Quantum-noise: protected data encryption for WDM fiber-optic networks. |
Comput. Commun. Rev. |
2004 |
DBLP DOI BibTeX RDF |
quantum cryptography, data encryption |
30 | Joseph K. Liu, Victor K. Wei, Duncan S. Wong |
Custodian-Hiding Verifiable Encryption. |
WISA |
2004 |
DBLP DOI BibTeX RDF |
Publicly Verifiable, Anonymity, Verifiable Encryption |
30 | Palash Sarkar 0001 |
HEAD: Hybrid Encryption with Delegated Decryption Capability. |
INDOCRYPT |
2004 |
DBLP DOI BibTeX RDF |
DHIES, delegated decryption, public key encryption |
30 | Kenneth G. Paterson, Arnold K. L. Yau |
Padding Oracle Attacks on the ISO CBC Mode Encryption Standard. |
CT-RSA |
2004 |
DBLP DOI BibTeX RDF |
padding oracle attack, CBC-mode encryption, ISO standard |
30 | Kaoru Kurosawa, Yvo Desmedt |
A New Paradigm of Hybrid Encryption Scheme. |
CRYPTO |
2004 |
DBLP DOI BibTeX RDF |
KEM, standard model, hybrid encryption |
30 | Omer Horvitz, Virgil D. Gligor |
Weak Key Authenticity and the Computational Completeness of Formal Encryption. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
Weak Key Authenticity, Authentication, Cryptography, Encryption, Completeness, Formal Reasoning |
30 | Davor Runje, Mario Kovac |
Universal Strong Encryption FPGA Core Implementation. |
DATE |
1998 |
DBLP DOI BibTeX RDF |
Chip Architecture, FPGA, Encryption, IDEA |
30 | Paul C. van Oorschot, Michael J. Wiener |
A Known Plaintext Attack on Two-Key Triple Encryption. |
EUROCRYPT |
1990 |
DBLP DOI BibTeX RDF |
Triple encryption, cryptanalysis, DES |
30 | Nuttapong Attrapadung, Hideki Imai |
Conjunctive Broadcast and Attribute-Based Encryption. |
Pairing |
2009 |
DBLP DOI BibTeX RDF |
Key policy, Revocable ABE, Disjunctive multi-authority ABE, Broadcast encryption, Attribute-based encryption, Ciphertext policy |
30 | David Galindo |
Breaking and Repairing Damgård et al. Public Key Encryption Scheme with Non-interactive Opening. |
CT-RSA |
2009 |
DBLP DOI BibTeX RDF |
non-interactive proofs, standard model, public key encryption, identity-based encryption |
30 | Cameron Laird |
Taking a Hard-Line Approach to Encryption. |
Computer |
2007 |
DBLP DOI BibTeX RDF |
Encryption-enabled hard drives, information security, Data encryption |
30 | Sherman S. M. Chow |
Token-Controlled Public Key Encryption in the Standard Model. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
Token-controlled, provable security, standard model, public key encryption, timed-release encryption |
30 | Yinxia Sun, Futai Zhang, Joonsang Baek |
Strongly Secure Certificateless Public Key Encryption Without Pairing. |
CANS |
2007 |
DBLP DOI BibTeX RDF |
certificateless public key encryption, public key encryption, Computational Diffie-Hellman problem |
30 | Reza Curtmola, Juan A. Garay, Seny Kamara, Rafail Ostrovsky |
Searchable symmetric encryption: improved definitions and efficient constructions. |
CCS |
2006 |
DBLP DOI BibTeX RDF |
searchable symmetric encryption, security definitions, multi-user, searchable encryption |
28 | Yuichi Komano, Kazuo Ohta |
Efficient Universal Padding Techniques for Multiplicative Trapdoor One-Way Permutation. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Tatsuaki Okamoto, David Pointcheval |
REACT: Rapid Enhanced-Security Asymmetric Cryptosystem Transform. |
CT-RSA |
2001 |
DBLP DOI BibTeX RDF |
|
28 | Adam J. Elbirt, Christof Paar |
An FPGA implementation and performance evaluation of the Serpent block cipher. |
FPGA |
2000 |
DBLP DOI BibTeX RDF |
algorithm-agility, FPGA, cryptography, VHDL, block cipher |
28 | Michael Walker 0001 |
On the Security of 3GPP Networks. |
EUROCRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
28 | Zhenyu Hu, JianChun Jiang, Fuchun Sun 0001 |
Using IND-CVA for constructing secure communication. |
Sci. China Ser. F Inf. Sci. |
2009 |
DBLP DOI BibTeX RDF |
integrity, authenticated encryption, semantic security, universally composable security, secure channel |
28 | Bian Yang, Christoph Busch 0001, Mohammad Omar Derawi, Patrick Bours, Davrondzhon Gafurov |
Geometric-Aligned Cancelable Fingerprint Templates. |
ICIAP |
2009 |
DBLP DOI BibTeX RDF |
cancelable fingerprint template, fingerprint alignment, coordinate encryption, template protection |
28 | Heng-Sheng Chen, Tsang-Yean Lee, Huey-Ming Lee |
Collect and broadcast news in security. |
ICIS |
2009 |
DBLP DOI BibTeX RDF |
cipher text, plaintext, algorithm, encryption, decryption |
28 | Kathryn Garson, Carlisle Adams |
Security and privacy system architecture for an e-hospital environment. |
IDtrust |
2008 |
DBLP DOI BibTeX RDF |
policy-based encryption, privacy, authentication, health care |
28 | Peng Wang 0009, Dengguo Feng, Wenling Wu |
Symmetric Nonce Respecting Security Model and the MEM Mode of Operation. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
nonce-based encryption, security model, modes of operation, Blockcipher, tweakable blockcipher |
28 | Manuel Barbosa, Pooya Farshim |
Secure Cryptographic Workflow in the Standard Model. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
Cryptographic Workflow, Key Encapsulation, Secret Sharing, Identity-Based Encryption |
28 | Jin Li 0002, Fangguo Zhang, Yanming Wang |
A New Hierarchical ID-Based Cryptosystem and CCA-Secure PKE. |
EUC Workshops |
2006 |
DBLP DOI BibTeX RDF |
Public key encryption, Identity based, Bilinear groups |
28 | Erkay Savas, Berk Sunar |
A Practical and Secure Communication Protocol in the Bounded Storage Model. |
ICN (2) |
2005 |
DBLP DOI BibTeX RDF |
hyper-encryption, information theoretical security, pervasive networks, Bounded storage model |
28 | Tomas Sander, Adam L. Young, Moti Yung |
Non-Interactive CryptoComputing For NC1. |
FOCS |
1999 |
DBLP DOI BibTeX RDF |
cryptocomputing, cryptography, public key, complexity theory, homomorphic encryption, secure computation |
28 | David Pointcheval |
New Public Key Cryptosystems Based on the Dependent-RSA Problems. |
EUROCRYPT |
1999 |
DBLP DOI BibTeX RDF |
the Dependent-RSA Problem, Public-Key Encryption, Semantic Security, Chosen-Ciphertext Attacks |
28 | Oded Goldreich 0001, Shafi Goldwasser, Shai Halevi |
Eliminating Decryption Errors in the Ajtai-Dwork Cryptosystem. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
Public-key Encryption Schemes, Computational Problems in Lattices |
28 | Benoît Chevallier-Mames, Marc Joye |
Chosen-Ciphertext Secure RSA-Type Cryptosystems. |
ProvSec |
2009 |
DBLP DOI BibTeX RDF |
RSA-based encryption schemes, instance-independence assumptions, one-time mappable chameleon hashing, standard model, public-key encryption, Chosen-ciphertext security |
28 | Takahiro Matsuda 0002, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai |
An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations. |
CT-RSA |
2009 |
DBLP DOI BibTeX RDF |
IND-CCA security, encapsulation, public key encryption, identity-based encryption, pseudorandom generator |
28 | Ming-Haw Jing, Jian-Hong Chen, Zih-Heng Chen, Yaotsu Chang |
The Secure DAES Design for Embedded System Application. |
EUC Workshops |
2007 |
DBLP DOI BibTeX RDF |
branch number, repeating property, symmetric encryption algorithms, embedded system, Advanced Encryption Standard, data security |
28 | Kristian Gjøsteen |
Symmetric Subgroup Membership Problems. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
subgroup membership problem, standard model, public key encryption, hybrid encryption |
28 | Seungjoo Kim, Jung Hee Cheon, Marc Joye, Seongan Lim, Masahiro Mambo, Dongho Won, Yuliang Zheng 0001 |
Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation). |
IMACC |
2001 |
DBLP DOI BibTeX RDF |
ciphertext validity, OAEP-RSA, Encryption, provable security, chosen-ciphertext security, ElGamal encryption |
28 | Stephen R. Dussé, Burton S. Kaliski Jr. |
A Cryptographic Library for the Motorola DSP56000. |
EUROCRYPT |
1990 |
DBLP DOI BibTeX RDF |
Encryption hardware, Message digest, Montgomery reduction, Motorola DSP56000, RSA, Data Encryption Standard (DES), Modular arithmetic, Multiple-precision arithmetic |
27 | Denis Osin, Vladimir Shpilrain |
Public Key Encryption and Encryption Emulation Attacks. |
CSR |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo |
On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Debrup Chakraborty, Palash Sarkar 0001 |
A New Mode of Encryption Providing a Tweakable Strong Pseudo-random Permutation. |
FSE |
2006 |
DBLP DOI BibTeX RDF |
tweakable encryption, strong pseudo-random permutation, mode of operation |
27 | Niels Ferguson, Doug Whiting, Bruce Schneier, John Kelsey, Stefan Lucks, Tadayoshi Kohno |
Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive. |
FSE |
2003 |
DBLP DOI BibTeX RDF |
authentication, Stream cipher, encryption, MAC |
25 | Vijay Nagarajan, Rajiv Gupta 0001, Arvind Krishnaswamy |
Compiler-Assisted Memory Encryption for Embedded Processors. |
Trans. High Perform. Embed. Archit. Compil. |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Jirí Giesl, Ladislav Behal, Karel K. Vlcek |
Hardware solution of chaos based image encryption. |
DDECS |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas Ristenpart, Gil Segev 0001, Hovav Shacham, Scott Yilek |
Hedged Public-Key Encryption: How to Protect against Bad Randomness. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Mihir Bellare, Dennis Hofheinz, Scott Yilek |
Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening. |
EUROCRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Giuseppe Ateniese, Karyn Benson, Susan Hohenberger |
Key-Private Proxy Re-encryption. |
CT-RSA |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Karl Martin, Konstantinos N. Plataniotis |
Coding and encryption of visual objects for privacy protected surveillance. |
ICIP |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Yang Lu 0001, Jiguo Li 0001, Junmo Xiao |
Applying the Fujisaki-Okamoto Conversion to Certificate-based Encryption. |
ISECS |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Manoj Prabhakaran 0001, Mike Rosulek |
Homomorphic Encryption with CCA Security. |
ICALP (2) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Yohei Hori, Akashi Satoh, Hirofumi Sakane, Kenji Toda |
Bitstream encryption and authentication with AES-GCM in dynamically reconfigurable systems. |
FPL |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Yang Lu 0001, Jiguo Li 0001, Junmo Xiao |
Generic Construction of Certificate-Based Encryption. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Zhao Song 0005, Hengjian Li, Yan Xu |
A Secure and Efficient Fingerprint Images Encryption Scheme. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Kazumasa Omote, Kazuhiko Kato |
Protection and Recovery of Disk Encryption Key Using Smart Cards. |
ITNG |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Chigullapally Narsimha Raju, Ganugula Umadevi, Kannan Srinathan, C. V. Jawahar |
Fast and Secure Real-Time Video Encryption. |
ICVGIP |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Jonathan Katz, Amit Sahai, Brent Waters |
Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products. |
EUROCRYPT |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Ayoub Massoudi, Frédéric Lefèbvre, Christophe De Vleeschouwer, François-Olivier Devaux |
Secure and Low Cost Selective Encryption for JPEG2000. |
ISM |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Yanli Ren, Dawu Gu |
Secure Hierarchical Identity Based Encryption Scheme in the Standard Model. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Chien-Pen Chuang, Tin-Ying Huang, Li-Chi Yeh |
Encryption and Decryption with Space Transformation for Bi-directional Association. |
EUC (2) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Yvo Desmedt, Duong Hieu Phan |
A CCA Secure Hybrid Damgård's ElGamal Encryption. |
ProvSec |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Dan Boneh, Shai Halevi, Michael Hamburg, Rafail Ostrovsky |
Circular-Secure Encryption from Decision Diffie-Hellman. |
CRYPTO |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Saeed Sedghi, Jeroen Doumen, Pieter H. Hartel, Willem Jonker |
Towards an Information Theoretic Analysis of Searchable Encryption. |
ICICS |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Zhenchuan Chai, Zhenfu Cao, Yuan Zhou |
Efficient ID-Based Multi-Decrypter Encryption with Short Ciphertexts. |
J. Comput. Sci. Technol. |
2007 |
DBLP DOI BibTeX RDF |
multi-user cryptography, proven security, random oracle, ID-based cryptography |
25 | Ran Canetti, Shai Halevi, Jonathan Katz |
A Forward-Secure Public-Key Encryption Scheme. |
J. Cryptol. |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Shujun Li, Guanrong Chen, Albert Cheung, Bharat K. Bhargava, Kwok-Tung Lo |
On the Design of Perceptual MPEG-Video Encryption Algorithms. |
IEEE Trans. Circuits Syst. Video Technol. |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Mihir Bellare, Alexandra Boldyreva, Kaoru Kurosawa, Jessica Staddon |
Multirecipient Encryption Schemes: How to Save on Bandwidth and Computation Without Sacrificing Security. |
IEEE Trans. Inf. Theory |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Zhaohui Cheng, Liqun Chen 0002, Li Ling, Richard Comley |
General and Efficient Certificateless Public Key Encryption Constructions. |
Pairing |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Cécile Delerablée, Pascal Paillier, David Pointcheval |
Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys. |
Pairing |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Youngjun Kim, Jason Kim 0004 |
U-City User Authentication Methods and Encryption Techniques Based on Biometric Technology. |
FBIT |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Gale D. Fritsche, Sara K. Rodgers |
Encryption technologies: testing and identifying campus needs. |
SIGUCCS |
2007 |
DBLP DOI BibTeX RDF |
breach, mandate, privacy, evaluation, protection, compliance, sensitive data |
25 | Ji-Seon Lee, Jik Hyun Chang |
Semantically Secure Authenticated Encryption Scheme and the Same Scheme for Ad-hoc Group Called a Ring. |
ITNG |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Michael O. Rabin |
DISC 20th Anniversary: Invited Talk Provably Unbreakable Hyper-Encryption Using Distributed Systems. |
DISC |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Chong Fu, Zhen-chuan Zhang, Ying Chen, Xingwei Wang 0001 |
An Improved Chaos-Based Image Encryption Scheme. |
International Conference on Computational Science (1) |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Petre Anghelescu, Silviu Ionita, Emil Sofron |
Block Encryption Using Hybrid Additive Cellular Automata. |
HIS |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Dalia Khader |
Public Key Encryption with Keyword Search Based on K-Resilient IBE. |
ICCSA (3) |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Mihir Bellare, Alexandra Boldyreva, Adam O'Neill |
Deterministic and Efficiently Searchable Encryption. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Manoj Prabhakaran 0001, Mike Rosulek |
Rerandomizable RCCA Encryption. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Vijay Nagarajan, Rajiv Gupta 0001, Arvind Krishnaswamy |
Compiler-Assisted Memory Encryption for Embedded Processors. |
HiPEAC |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Yinian Mao, Min Wu 0001 |
A Joint Signal Processing and Cryptographic Approach to Multimedia Encryption. |
IEEE Trans. Image Process. |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Panu Hämäläinen, Timo Alho, Marko Hännikäinen, Timo D. Hämäläinen |
Design and Implementation of Low-Area and Low-Power AES Encryption Hardware Core. |
DSD |
2006 |
DBLP DOI BibTeX RDF |
|
25 | François-Xavier Standaert, Gilles Piret, Neil Gershenfeld, Jean-Jacques Quisquater |
SEA: A Scalable Encryption Algorithm for Small Embedded Applications. |
CARDIS |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Daniele Micciancio, Saurabh Panjwani |
Corrupting One vs. Corrupting Many: The Case of Broadcast and Multicast Encryption. |
ICALP (2) |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Yi Xin, Ran Tao 0003, Yue Wang 0001 |
Image Encryption Based on a Novel Reality-Preserving. |
ICICIC (3) |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Gang Chen 0001, Ke Chen 0005, Jinxiang Dong |
A Database Encryption Scheme for Enhanced Security and Easy Sharing. |
CSCWD |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Fengling Han, Jiankun Hu, Xinghuo Yu 0001 |
A Biometric Encryption Approach Incorporating Fingerprint Indexing in Key Generation. |
ICIC (3) |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Ulrich Kühn 0001 |
Analysis of a Database and Index Encryption Scheme - Problems and Fixes. |
Secure Data Management |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Benoît Chevallier-Mames, Pascal Paillier, David Pointcheval |
Encoding-Free ElGamal Encryption Without Random Oracles. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Rong-Jian Chen, Yi-Te Lai, Jui-Lin Lai |
Architecture design and VLSI hardware implementation of image encryption/decryption system using re-configurable 2D Von Neumann cellular automata. |
ISCAS |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Ling Dong, Kefei Chen |
A Practical Clumped-Tree Multicast Encryption Scheme. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Dalia Khader |
Public Key Encryption with Keyword Search Based on K-Resilient IBE. |
ICCSA (3) |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Martin Stanek, Lubica Staneková |
Unpuzzling Puzzle (analysis of a video encryption algorithm). |
AINA (2) |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Han Yu, Xiamu Niu, Duohe Ma, Changxiang Shen |
Research on Applying Java Card to Database Encryption Systems. |
IIH-MSP |
2006 |
DBLP DOI BibTeX RDF |
|
25 | James F. Ryan, Blair L. Reid |
Usable Encryption Enabled by AJAX. |
ICNS |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Chao-Shen Chen, Rong-Jian Chen |
Image Encryption and Decryption Using SCAN Methodology. |
PDCAT |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Amir Said |
Measuring the strength of partial encryption schemes. |
ICIP (2) |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Guido Appenzeller |
Identity-based encryption from algorithm to enterprise deployment. |
CCS |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Adam L. Young, Moti Yung |
Questionable Encryption and Its Applications. |
Mycrypt |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Yevgeniy Dodis, Adam D. Smith |
Entropic Security and the Encryption of High Entropy Messages. |
TCC |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Shakith Fernando, Yajun Ha |
Design of Networked Reconfigurable Encryption Engine. |
FCCM |
2005 |
DBLP DOI BibTeX RDF |
|
25 | T. S. B. Sudarshan, Rahil Mir, S. Vijayalakshmi |
DRIL- A Flexible Architecture for Blowfish Encryption Using Dynamic Reconfiguration, Replication, Inner-Loop Pipelining, Loop Folding Techniques. |
Asia-Pacific Computer Systems Architecture Conference |
2005 |
DBLP DOI BibTeX RDF |
Blowfish, inner loop pipeline, loop folding, four - tier architecture, Platform independent architecture, DRIL Architecture, replication, Dynamic reconfiguration |
25 | Mamun Bin Ibne Reaz, Faisal Mohd-Yasin, S. L. Tan, H. Y. Tan, Muhammad I. Ibrahimy |
Partial encryption of compressed images employing FPGA. |
ISCAS (3) |
2005 |
DBLP DOI BibTeX RDF |
|
Displaying result #301 - #400 of 21739 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ >>] |
|