The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for AES with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1987-1999 (21) 2000 (46) 2001 (27) 2002 (53) 2003 (70) 2004 (95) 2005 (93) 2006 (119) 2007 (131) 2008 (147) 2009 (131) 2010 (108) 2011 (132) 2012 (97) 2013 (117) 2014 (133) 2015 (106) 2016 (107) 2017 (140) 2018 (131) 2019 (132) 2020 (134) 2021 (109) 2022 (135) 2023 (117) 2024 (34)
Publication types (Num. hits)
article(965) book(2) incollection(10) inproceedings(1674) phdthesis(9) proceedings(5)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1145 occurrences of 417 keywords

Results
Found 2665 publication records. Showing 2665 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
21Seokhie Hong, Jongsung Kim, Sangjin Lee 0002, Bart Preneel Related-Key Rectangle Attacks on Reduced Versions of SHACAL-1 and AES-192. Search on Bibsonomy FSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Hua Li, Zachary Friggstad An efficient architecture for the AES mix columns operation. Search on Bibsonomy ISCAS (5) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Hua Li A new CAM based S/S-1-box look-up table in AES. Search on Bibsonomy ISCAS (5) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Minh-Triet Tran, Anh Duc Duong Applying the AES and Its Extended Versions in a General Framework for Hiding Information in Digital Images. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Kris Tiri, David D. Hwang, Alireza Hodjat, Bo-Cheng Lai, Shenglin Yang, Patrick Schaumont, Ingrid Verbauwhede A side-channel leakage free coprocessor IC in 0.18µm CMOS for embedded AES-based cryptographic and biometric processing. Search on Bibsonomy DAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security IC, encryption, smart card, side-channel attack, differential power analysis, countermeasure
21Sumio Morioka, Akashi Satoh A 10-Gbps full-AES crypto design with a twisted BDD S-Box architecture. Search on Bibsonomy IEEE Trans. Very Large Scale Integr. Syst. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
21Delong Shang, Frank P. Burns, Alexandre V. Bystrov, Albert Koelmans, Danil Sokolov, Alexandre Yakovlev A Low and Balanced Power Implementation of the AES Security Mechanism Using Self-Timed Circuits. Search on Bibsonomy PATMOS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
21Alireza Hodjat, Ingrid Verbauwhede A 21.54 Gbits/s Fully Pipelined AES Processor on FPGA. Search on Bibsonomy FCCM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
21Guido Bertoni, Luca Breveglieri, Israel Koren, Paolo Maistri An Efficient Hardware-Based Fault Diagnosis Scheme for AES: Performances and Cost. Search on Bibsonomy DFT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
21Goce Jakimoski, Yvo Desmedt Related-Key Differential Cryptanalysis of 192-bit Key AES Variants. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF related keys, Markov ciphers, Advanced Encryption Standard, Differential cryptanalysis
21François Charot, Eslam Yahya, Charles Wagner Efficient Modular-Pipelined AES Implemenation in Counter Mode on ALTERA FPGA. Search on Bibsonomy FPL The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
21Pawel Chodowiec, Kris Gaj Very Compact FPGA Implementation of the AES Algorithm. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
21Anna Labbé, Annie Pérez AES Implementation on FPGA: Time - Flexibility Tradeoff. Search on Bibsonomy FPL The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
21Lauren May, Matthew Henricksen, William Millan, Gary Carter, Ed Dawson Strengthening the Key Schedule of the AES. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
21Joan Daemen, Vincent Rijmen AES and the Wide Trail Design Strategy. Search on Bibsonomy EUROCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
21Sumio Morioka, Akashi Satoh A 10 Gbps Full-AES Crypto Design with a Twisted-BDD S-Box Architecture. Search on Bibsonomy ICCD The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
21Mehboob Alam, Wael M. Badawy, Graham A. Jullien A Novel Pipelined Threads Architecture for AES Encryption Algorithm. Search on Bibsonomy ASAP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
21Guido Bertoni, Luca Breveglieri, Pasqualina Fragneto, Marco Macchetti, Stefano Marchesin 0002 Efficient Software Implementation of AES on 32-Bit Platforms. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
21Elena Trichina, Domenico De Seta, Lucia Germani Simplified Adaptive Multiplicative Masking for AES. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
21Thomas S. Messerges Securing the AES Finalists Against Power Analysis Attacks. Search on Bibsonomy FSE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
17Andrew B. Kahng, Chul-Hong Park, Puneet Sharma, Qinke Wang Lens aberration aware placement for timing yield. Search on Bibsonomy ACM Trans. Design Autom. Electr. Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Layout, design for manufacturing, lithography, timing yield
17Xiaojun Ruan, Adam Manzanares, Shu Yin, Mais Nijim, Xiao Qin 0001 Can We Improve Energy Efficiency of Secure Disk Systems without Modifying Security Mechanisms? Search on Bibsonomy NAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Krystian Matusiewicz, María Naya-Plasencia, Ivica Nikolic, Yu Sasaki, Martin Schläffer Rebound Attack on the Full Lane Compression Function. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF LANE, rebound attack, semi-free-start collision, cryptanalysis, hash function, SHA-3
17Mario Lamberger, Florian Mendel, Christian Rechberger, Vincent Rijmen, Martin Schläffer Rebound Distinguishers: Results on the Full Whirlpool Compression Function. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cryptanalysis, hash functions, distinguisher, near-collision
17Ilya Kizhvatov Side channel analysis of AVR XMEGA crypto engine. Search on Bibsonomy WESS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cryptography, DPA, side channel analysis
17Philipp Grabher, Johann Großschädl, Dan Page Non-deterministic processors: FPGA-based analysis of area, performance and security. Search on Bibsonomy WESS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF micro-architectural countermeasures, non-deterministic processors, side-channel attack, processor design
17Minoru Saeki, Daisuke Suzuki, Koichi Shimizu, Akashi Satoh A Design Methodology for a DPA-Resistant Cryptographic LSI with RSL Techniques. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Mariusz Czapski, Maciej Nikodem Error detection and error correction procedures for the advanced encryption standard. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF AMS Classification 94A60
17Matthew Robshaw The eSTREAM Project. Search on Bibsonomy The eSTREAM Finalists The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Anthony Blake, Richard Nelson Scalable Architecture for Prefix Preserving Anonymization of IP Addresses. Search on Bibsonomy SAMOS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Ryan Pries, Wei Yu 0002, Xinwen Fu, Wei Zhao 0001 A New Replay Attack Against Anonymous Communication Networks. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Ronghua Lu, Jun Han 0003, Xiaoyang Zeng, Qing Li, Lang Mai, Jia Zhao A low-cost cryptographic processor for security embedded system. Search on Bibsonomy ASP-DAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Dai Watanabe, Kota Ideguchi, Jun Kitahara, Kenichiro Muto, Hiroki Furuichi, Toshinobu Kaneko Enocoro-80: A Hardware Oriented Stream Cipher. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Panama, stream cipher
17Buyun Qu, Lianhao Liu An XSL Analysis on BES. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Anita J. La Salle Workshop 10 introduction: The Next Generation Software (NGS) workshop - NGS 2008. Search on Bibsonomy IPDPS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Steffen Peter, Mario Zessack, Frank Vater, Goran Panic, Horst Frankenfeldt, Michael Methfessel An Encryption-Enabled Network Protocol Accelerator. Search on Bibsonomy WWIC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Yedidya Hilewitz, Yiqun Lisa Yin, Ruby B. Lee Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical Permutation. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Olivier Billet, Matthew J. B. Robshaw, Yannick Seurin, Yiqun Lisa Yin Looking Back at a New Hash Function. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Ning Chen 0004, Zhiyuan Yan 0001 Compact designs of mixcolumns and subbytes using a novel common subexpression elimination algorithm. Search on Bibsonomy ISCAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Jean-Sébastien Coron A New DPA Countermeasure Based on Permutation Tables. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Jorge Nakahara Jr. 3D: A Three-Dimensional Block Cipher. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF block cipher design, 3-dimensional state
17Panu Hämäläinen, Marko Hännikäinen, Timo D. Hämäläinen Review of Hardware Architectures for Advanced Encryption Standard Implementations Considering Wireless Sensor Networks. Search on Bibsonomy SAMOS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Jeff Lewis Cryptol: specification, implementation and verification of high-grade cryptographic applications. Search on Bibsonomy FMSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cryptography, specification language, certification, high assurance, symmetric key
17Pallapa Venkataram, B. Sathish Babu, M. K. Naveen, G. H. Samyama Gungal A Method of Fraud & Intrusion Detection for E-payment Systems in Mobile e-Commerce. Search on Bibsonomy IPCCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Frederica Darema The Next Generation Software Workshop - IPDPS'07. Search on Bibsonomy IPDPS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Chia-Hui Wang, Mei-Wen Li, Wanjiun Liao A Distributed Key-Changing Mechanism for Secure Voice Over IP (VoIP) Service. Search on Bibsonomy ICME The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Martin Feldhofer, Johannes Wolkerstorfer Strong Crypto for RFID Tags - A Comparison of Low-Power Hardware Implementations. Search on Bibsonomy ISCAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Cristiana Bolchini, Antonio Miele, Marco D. Santambrogio TMR and Partial Dynamic Reconfiguration to mitigate SEU faults in FPGAs. Search on Bibsonomy DFT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Máire McLoone, Matthew J. B. Robshaw Public Key Cryptography and RFID Tags. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Atsushi Watanabe, Hiroshi Haruki, Shun Shimotomai, Takeshi Saito, Tomoyuki Nagase, Yoshio Yoshioka, Yoshiei Hasegawa A New Mutable Nonlinear Transformation Algorithm for S-box. Search on Bibsonomy AINA Workshops (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Vinod Kathail, Shail Aditya, Craig Gleason, Nagesh Chatekar Tutorial T8A: Automated Application Engine Synthesis from C Algorithms. Search on Bibsonomy VLSI Design The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Homin K. Lee, Tal Malkin, Erich M. Nahum Cryptographic strength of ssl/tls servers: current and recent practices. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2007 DBLP  DOI  BibTeX  RDF network security, servers, ssl
17Sidney Rosario, David Kitchin, Albert Benveniste, William R. Cook, Stefan Haar, Claude Jard Event Structure Semantics of Orc. Search on Bibsonomy WS-FM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Nikhil Joshi, Jayachandran Sundararajan, Kaijie Wu 0001, Bo Yang 0010, Ramesh Karri Tamper Proofing by Design Using Generalized Involution-Based Concurrent Error Detection for Involutional Substitution Permutation and Feistel Networks. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Subsitution Permutation Networks (SPN), ANUBIS, TwoFish, cryptography, Concurrent Error Detection (CED), tamper proofing, Feistel networks
17José M. Rodrigues, William Puech, Adrian G. Bors Selective Encryption of Human Skin in JPEG Images. Search on Bibsonomy ICIP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Sargur N. Srihari, Jim Collins, Rohini K. Srihari, Pavithra Babu, Harish Srinivasan Automated Scoring of Handwritten Essays Based on Latent Semantic Analysis. Search on Bibsonomy Document Analysis Systems The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Kazuhiko Minematsu Improved Security Analysis of XEX and LRW Modes. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Raphael C.-W. Phan, Sung-Ming Yen Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis. Search on Bibsonomy CARDIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Attacks and countermeasures in hardware and software, cryptanalysis, Advanced Encryption Standard, side-channel attacks, fault attacks
17Ermaliza Razali, Raphael C.-W. Phan On the Existence of Related-Key Oracles in Cryptosystems Based on Block Ciphers. Search on Bibsonomy OTM Workshops (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Akashi Satoh High-speed hardware architectures for authenticated encryption mode GCM. Search on Bibsonomy ISCAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Jianyong Huang, Jennifer Seberry, Willy Susilo On the Internal Structure of Alpha-MAC. Search on Bibsonomy VIETCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Alex Biryukov, Sourav Mukhopadhyay, Palash Sarkar 0001 Improved Time-Memory Trade-Offs with Multiple Data. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF time/memory/data trade-off, key sizes, block-cipher
17Panu Hämäläinen, Jari Heikkinen, Marko Hännikäinen, Timo D. Hämäläinen Design of Transport Triggered Architecture Processors for Wireless Encryption. Search on Bibsonomy DSD The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Youtao Zhang, Lan Gao, Jun Yang 0002, Xiangyu Zhang 0001, Rajiv Gupta 0001 SENSS: Security Enhancement to Symmetric Shared Memory Multiprocessors. Search on Bibsonomy HPCA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Mohamed N. Bennani, Daniel A. Menascé Resource Allocation for Autonomic Data Centers using Analytic Performance Models. Search on Bibsonomy ICAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Creighton T. R. Hager, Scott F. Midkiff, Jung-Min Park 0001, Thomas L. Martin Performance and Energy Efficiency of Block Ciphers in Personal Digital Assistants. Search on Bibsonomy PerCom The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Mitsuru Matsui, Sayaka Fukuda How to Maximize Software Performance of Symmetric Primitives on Pentium III and 4 Processors. Search on Bibsonomy FSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Joan Daemen, Vincent Rijmen A New MAC Construction ALRED and a Specific Instance ALPHA-MAC. Search on Bibsonomy FSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Eli Biham, Orr Dunkelman, Nathan Keller Related-Key Boomerang and Rectangle Attacks. Search on Bibsonomy EUROCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17A. Murat Fiskiran, Ruby B. Lee Fast Parallel Table Lookups to Accelerate Symmetric-Key Cryptography. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Bo Yang 0010, Kaijie Wu 0001, Ramesh Karri Secure scan: a design-for-test architecture for crypto chips. Search on Bibsonomy DAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF crypto hardware, scan-based DFT, security, testability
17Mark G. Karpovsky, Konrad J. Kulikowski, Alexander Taubin Robust Protection against Fault-Injection Attacks on Smart Cards Implementing the Advanced Encryption Standard. Search on Bibsonomy DSN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Tadayoshi Kohno Attacking and repairing the winZip encryption scheme. Search on Bibsonomy CCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF WinZip, Zip, security fixes, compression, encryption, attacks, applied cryptography
17Thilo Pionteck, Thorsten Staake, Thomas Stiefmeier, Lukusa D. Kabulepa, Manfred Glesner On the design of a function-specific reconfigurable: hardware accelerator for the MAC-layer in WLANs. Search on Bibsonomy FPGA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Ross J. Anderson The Dancing Bear: A New Way of Composing Ciphers. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Joseph Fong, Irene S. Y. Kwan, Margaret Ng, Ivan Li, S. K. Chan An Application-Oriented e-Learning System with Self-monitoring and Adaptive Exercises. Search on Bibsonomy ICWL The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17D. Frank Hsu Graph Containers, Information Delay, and Network Vulnerability. Search on Bibsonomy AINA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Wei Ming Lim, Mohammed Benaissa Design space exploration of a hardware-software co-designed GF(2m) galois field processor for forward error correction and cryptography. Search on Bibsonomy CODES+ISSS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF GF(2m) arithmetic, forward error control coding, galois field processor, cryptography, advanced encryption standard, elliptic curve cryptography, design space exploration, Reed-Solomon code, hardware-software co-design, BCH code
17Subhayan Sen, Sk. Iqbal Hossain, Kabirul Islam, Dipanwita Roy Chowdhury, Parimal Pal Chaudhuri Cryptosystem Designed for Embedded System Security. Search on Bibsonomy VLSI Design The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Yong-Cong Chen, Long-Wen Chang A secure and robust digital watermarking technique by the block cipher RC6 and secure hash algorithm. Search on Bibsonomy ICIP (2) The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
17Liam Keliher, Henk Meijer, Stafford E. Tavares Improving the Upper Bound on the Maximum Average Linear Hull Probability for Rijndael. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
17Kazumaro Aoki, Tetsuya Ichikawa, Masayuki Kanda, Mitsuru Matsui, Shiho Moriai, Junko Nakajima, Toshio Tokita Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
17Helena Handschuh, Serge Vaudenay A Universal Encryption Standard. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
17Chae Hoon Lim A Revised Version of Crypton - Crypton V1.0. Search on Bibsonomy FSE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
17H. Harry Zhou Adaptive Expert Systems and Analogical Problem Solving. Search on Bibsonomy ICCI The full citation details ... 1990 DBLP  DOI  BibTeX  RDF Analogical problem solving, Expert systems, Case-based reasoning
15Michael E. Kounavis, Xiaozhu Kang, Ken Grewal, Mathew Eszenyi, Shay Gueron, David Durham Encrypting the internet. Search on Bibsonomy SIGCOMM The full citation details ... 2010 DBLP  DOI  BibTeX  RDF GCM, cryptographic algorithm acceleration, AES, RSA, HTTPS, secure communications, SSL, TLS
15Itai Dinur, Adi Shamir Generic Analysis of Small Cryptographic Leaks. Search on Bibsonomy FDTC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF cube attacks, robust cube attacks, cryptanalysis, AES, side channel attacks, Serpent
15Piyush Kumar Shukla, Sanjay Silakari, Sarita Singh Bhadoriya Network Security Scheme for Wireless Sensor Networks using Efficient CSMA MAC Layer Protocol. Search on Bibsonomy ITNG The full citation details ... 2009 DBLP  DOI  BibTeX  RDF CBC-X, WSN, MAC, AES, CSMA/CA, CSMA, Link layer security
15Nabil M. K. Mirza, Ziad Osman, Rached N. Zantout, Mohamed El-Sayed 0005 Error Correction of Noisy Block Cipher Using Cipher and Plaintext Characteristics. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Block Cipher, AES, Error Correction
15Yuqun Chen, Michael Sinclair Tangible security for mobile devices. Search on Bibsonomy MobiQuitous The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, mobile devices, RFID, encryption, AES, tokens, NFC
15Daniele Fronte, Annie Pérez, Eric Payrat Celator: A Multi-algorithm Cryptographic Co-processor. Search on Bibsonomy ReConFig The full citation details ... 2008 DBLP  DOI  BibTeX  RDF key cryptography, Systolic Processors, Cryptography, Smart cards, AES, Communication system security
15Lars R. Knudsen, Christian Rechberger, Søren S. Thomsen The Grindahl Hash Functions. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF hash functions, AES, Rijndael, proposal, design strategy
15Nachiketh R. Potlapally, Srivaths Ravi 0001, Anand Raghunathan, Niraj K. Jha A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF energy analysis, security, embedded system, low-power, AES, RSA, security protocols, ECC, DES, handheld, SSL, Diffie-Hellman, DSA, cryptographic algorithms, 3DES
15Anthony D. Wood, John A. Stankovic AMSecure: secure link-layer communication in TinyOS for IEEE 802.15.4-based wireless sensor networks. Search on Bibsonomy SenSys The full citation details ... 2006 DBLP  DOI  BibTeX  RDF AES, wireless sensor network security
15Lars R. Knudsen, Chris J. Mitchell Partial Key Recovery Attack Against RMAC. Search on Bibsonomy J. Cryptol. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF RMAC, AES, Message Authentication Codes, Triple DES
15Lei Chen, Chung-wei Lee Multi-level secure video streaming over SRTP. Search on Bibsonomy ACM Southeast Regional Conference (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF motion jpeg, AES, DCT, quantization, jpeg, SRTP
15Andreas Dandalis, Viktor K. Prasanna An adaptive cryptographic engine for internet protocol security architectures. Search on Bibsonomy ACM Trans. Design Autom. Electr. Syst. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF performance tradeoffs, reconfigurable components, cryptography, reconfigurable computing, AES, configurable, high performance, IPSec, reconfigurable systems, Adaptive computing
15Phillip Rogaway, Mihir Bellare, John Black OCB: A block-cipher mode of operation for efficient authenticated encryption. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF block-cipher usage, authenticity, cryptography, integrity, standards, encryption, AES, provable security, modes of operation
15Berk Sunar, Erkay Savas, Çetin Kaya Koç Constructing Composite Field Representations for Efficient Conversion. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Composite and binary fields, change of basis, AES, primitive element
15Nachiketh R. Potlapally, Srivaths Ravi 0001, Anand Raghunathan, Niraj K. Jha Analyzing the energy consumption of security protocols. Search on Bibsonomy ISLPED The full citation details ... 2003 DBLP  DOI  BibTeX  RDF energy analysis, security, embedded system, low-power, AES, RSA, security protocols, ECC, DES, handheld, SSL, Diffie-Hellman, DSA, cryptographic algorithms, 3DES
Displaying result #401 - #500 of 2665 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license