The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for AES with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1987-1999 (21) 2000 (46) 2001 (27) 2002 (53) 2003 (70) 2004 (95) 2005 (93) 2006 (119) 2007 (131) 2008 (147) 2009 (131) 2010 (108) 2011 (132) 2012 (97) 2013 (117) 2014 (133) 2015 (106) 2016 (107) 2017 (140) 2018 (131) 2019 (132) 2020 (134) 2021 (109) 2022 (135) 2023 (117) 2024 (34)
Publication types (Num. hits)
article(965) book(2) incollection(10) inproceedings(1674) phdthesis(9) proceedings(5)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1145 occurrences of 417 keywords

Results
Found 2665 publication records. Showing 2665 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
15Anand Raghunathan, Nachiketh R. Potlapally, Srivaths Ravi 0001 Securing Wireless Data: System Architecture Challenges. Search on Bibsonomy ISSS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF WTLS, security, performance, mobile computing, embedded system, wireless communications, encryption, AES, RSA, design methodology, system architecture, platform, DES, IPSec, SSL, decryption, handset, 3DES, security processing
15Hiroto Yasuura, Hiroyuki Tomiyama, Takanori Okuma, Yun Cao Data Memory Design Considering Effective Bitwidth for Low-Energy Embedded Systems. Search on Bibsonomy ISSS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF WTLS, security, performance, mobile computing, embedded system, wireless communications, encryption, AES, RSA, design methodology, system architecture, platform, DES, IPSec, SSL, decryption, handset, 3DES, security processing
15Phillip Rogaway, Mihir Bellare, John Black, Ted Krovetz OCB: a block-cipher mode of operation for efficient authenticated encryption. Search on Bibsonomy CCS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF authenticity, cryptography, integrity, standards, encryption, block ciphers, AES, provable security, modes of operation
14Howard M. Heys, Liang Zhang Pipelined Statistical Cipher Feedback: A New Mode for High-Speed Self-Synchronizing Stream Encryption. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2011 DBLP  DOI  BibTeX  RDF Cryptography, synchronization, stream ciphers, block ciphers, advanced encryption standard (AES), mode of operation, error propagation
14Maricel O. Balitanas, Rosslin John Robles, Nayoun Kim, Tai-Hoon Kim Crossed Crypto-Scheme in WPA PSK Mode. Search on Bibsonomy BLISS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cryptography, wireless, Advanced Encryption Standard (AES), Elliptic Curve Cryptography (ECC), WPA
14Ted Huffmire, Brett Brotherton, Nick Callegari, Jonathan Valamehr, Jeff White, Ryan Kastner, Timothy Sherwood Designing secure systems on reconfigurable hardware. Search on Bibsonomy ACM Trans. Design Autom. Electr. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF controlled sharing, enforcement mechanisms, security primitives, Field programmable gate arrays (FPGAs), static analysis, advanced encryption standard (AES), security policies, systems-on-a-chip (SoCs), separation, isolation, memory protection, reference monitors, hardware security, execution monitors
14Giorgio Di Natale, M. Doulcier, Marie-Lise Flottes, Bruno Rouzeyre A Reliable Architecture for the Advanced Encryption Standard. Search on Bibsonomy ETS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF AES cryptochip, On-Line Self-Test, Reliability
14An'an Luo, Chuang Lin 0002, Zhen Chen 0001, Xuehai Peng, Peter D. Ungsunan TNC-compatible NAC System implemented on Network Processor. Search on Bibsonomy LCN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF TNC, AES algorithm, network processor, network access control
12Xueping Yan, Lin Tan 0003, Hong Xu 0008, Wen-Feng Qi 0001 Improved mixture differential attacks on 6-round AES-like ciphers towards time and data complexities. Search on Bibsonomy J. Inf. Secur. Appl. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Raghavan Kumar, Avinash L. Varna, Carlos Tokunaga, Sachin Taneja, Vivek De, Sanu K. Mathew A 100-Gbps Fault-Injection Attack-Resistant AES-256 Engine With 99.1%-99.99% Error Coverage in Intel 4 CMOS. Search on Bibsonomy IEEE J. Solid State Circuits The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Sunday Adeola Ajagbe, Oluwashola David Adeniji, Adedayo Amos Olayiwola, Seun Femi Abiona Advanced Encryption Standard (AES)-Based Text Encryption for Near Field Communication (NFC) Using Huffman Compression. Search on Bibsonomy SN Comput. Sci. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Samira Abboud, Nabil Abdoun Enhancing LoRaWAN Security: An Advanced AES-Based Cryptographic Approach. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Mohammed Y. Shakor, Mustafa Ibrahim Khaleel, Mejdl S. Safran, Sultan Alfarhood, Michelle Zhu Dynamic AES Encryption and Blockchain Key Management: A Novel Solution for Cloud Data Security. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Tran Thi Luong, Nguyen Ngoc Cuong, Bay Vo AES Security Improvement by Utilizing New Key-Dependent XOR Tables. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Anit Kumar Ghosal, Amit Sardar, Dipanwita Roychowdhury Differential fault analysis attack-tolerant hardware implementation of AES. Search on Bibsonomy J. Supercomput. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Jing-yu Sun, Hong Cai, Hao Zhang 0061 A novel image encryption algorithm combined complex order chaotic system and modified AES. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Firat Artuger, Fatih Özkaynak A new algorithm to generate aes-like substitution boxes based on sine cosine optimization algorithm. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Shikha Gupta, Satbir Jain, Mohit Agarwal, Nalin Nanda An encryption approach to improve the security and performance of data by integrating AES with a modified OTP technique. Search on Bibsonomy Int. J. Adv. Intell. Paradigms The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Nicolas David 0001, María Naya-Plasencia, André Schrottenloher Quantum impossible differential attacks: applications to AES and SKINNY. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Jiqiang Lu, Wenchang Zhou Improved meet-in-the-middle attack on 10 rounds of the AES-256 block cipher. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Ming-Bo Lin, Jen-Hua Chuang The Design of a High-Throughput Hardware Architecture for the AES-GCM Algorithm. Search on Bibsonomy IEEE Trans. Consumer Electron. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Barbara Gigerl, Franz Klug, Stefan Mangard, Florian Mendel, Robert Primas Smooth Passage with the Guards: Second-Order Hardware Masking of the AES with Low Randomness and Low Latency. Search on Bibsonomy IACR Trans. Cryptogr. Hardw. Embed. Syst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Haruka Hirata, Daiki Miyahara, Victor Arribas, Yang Li 0001, Noriyuki Miura, Svetla Nikova, Kazuo Sakiyama All You Need Is Fault: Zero-Value Attacks on AES and a New λ-Detection M&M. Search on Bibsonomy IACR Trans. Cryptogr. Hardw. Embed. Syst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Haotian Shi, Xiutao Feng Quantum Circuits of AES with a Low-depth Linear Layer and a New Structure. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
12Xiaoyang Dong, Jian Guo 0001, Shun Li, Phuong Pham, Tianyu Zhang Improved Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
12Shiyao Chen, Jian Guo 0001, Eik List, Danping Shi, Tianyu Zhang Diving Deep into the Preimage Security of AES-like Hashing. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
12Christoph Dobraunig, Krystian Matusiewicz, Bart Mennink, Alexander Tereschenko Efficient Instances of Docked Double Decker With AES. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
12Hosein Hadipour, Patrick Derbez, Maria Eichlseder Revisiting Differential-Linear Attacks via a Boomerang Perspective with Application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
12Christina Boura, Patrick Derbez, Margot Funk Alternative Key Schedules for the AES. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
12Tran Thi Luong, Linh Hoang Dinh On generating new key dependent XOR tables to improve AES security and evaluating the randomness of the output of block ciphers. Search on Bibsonomy Int. J. Inf. Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Li Zhang, Yu Zhang, Wenling Wu, Yongxia Mao, Yafei Zheng Explicit Upper Bound Of Impossible Differentials For AES-Like Ciphers: Application To uBlock And Midori. Search on Bibsonomy Comput. J. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Xiaoyang Dong, Jian Guo 0001, Shun Li, Phuong Pham, Tianyu Zhang Improved Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing. Search on Bibsonomy IACR Trans. Symmetric Cryptol. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Patrick Derbez, Pierre-Alain Fouque, Takanori Isobe 0001, Mostafizar Rahman, André Schrottenloher Key Committing Attacks against AES-based AEAD Schemes. Search on Bibsonomy IACR Trans. Symmetric Cryptol. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Paul Krüger, Stefan Wildermann, Jürgen Teich CRESTS: Chronology-based Reconstruction for Side-Channel Trace Segmentation for XTS-AES on Complex Targets. Search on Bibsonomy EuroSec@EUROSYS The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Nicolas Belleville, Loïc Masure Combining Loop Shuffling and Code PolyMorphism for Enhanced AES Side-Channel Security. Search on Bibsonomy COSADE The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Thomas Marquet, Elisabeth Oswald Exploring Multi-task Learning in the Context of Masked AES Implementations. Search on Bibsonomy COSADE The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Yuto Miura, Hiroki Nishikawa, Xiangbo Kong, Hiroyuki Tomiyama Impacts of Clock Frequency and Sampling Intervals on Power Side-Channel Leakage of AES Circuits. Search on Bibsonomy ICEIC The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Christina Boura, Patrick Derbez, Margot Funk Alternative Key Schedules for the AES. Search on Bibsonomy ACNS (2) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Orr Dunkelman, Shibam Ghosh, Nathan Keller, Gaëtan Leurent, Avichai Marmor, Victor Mollimard Partial Sums Meet FFT: Improved Attack on 6-Round AES. Search on Bibsonomy EUROCRYPT (1) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Shiyao Chen, Jian Guo 0001, Eik List, Danping Shi, Tianyu Zhang Diving Deep into the Preimage Security of AES-Like Hashing. Search on Bibsonomy EUROCRYPT (1) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Sirish Oruganti, Meizhi Wang, Vishnuvardhan V. Iyer, Yipeng Wang 0017, Mengtian Yang, Raghavan Kumar, Sanu K. Mathew, Jaydeep P. Kulkarni Power and EM Side-Channel-Attack-Resilient AES-128 Core with Round-Aligned Globally-Synchronous-Locally-Asynchronous Operation Based on Tunable Replica Circuits. Search on Bibsonomy ISSCC The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Jiqiang Lu, Wenchang Zhou Improved Meet-in-the-Middle Attacks on Nine Rounds of the AES-192 Block Cipher. Search on Bibsonomy CT-RSA The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Huwaida T. Elshoush, Roua M. Mohammed, Mona T. Abdelhameed, Amel F. Mohammed Mitigating Man-in-the-middle Attack In Online Payment System Transaction Using Polymorphic AES Encryption Algorithm. Search on Bibsonomy J. Inf. Hiding Multim. Signal Process. The full citation details ... 2023 DBLP  BibTeX  RDF
12Raghavan Kumar, Vikram B. Suresh, Sachin Taneja, Mark A. Anders 0001, Steven Hsu, Amit Agarwal 0001, Vivek De, Sanu K. Mathew A 7-Gbps SCA-Resistant Multiplicative-Masked AES Engine in Intel 4 CMOS. Search on Bibsonomy IEEE J. Solid State Circuits The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
12M. Naim, A. Ali Pacha New chaotic satellite image encryption by using some or all the rounds of the AES algorithm. Search on Bibsonomy Inf. Secur. J. A Glob. Perspect. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
12Farah Tawfiq Abdul Hussien, Teaba Wala Aldeen Khairi Performance Evaluation of AES, ECC and Logistic Chaotic Map Algorithms in Image Encryption. Search on Bibsonomy Int. J. Interact. Mob. Technol. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
12Clay Carper, Stone Olguin, Jarek Brown, Caylie Charlton, Mike Borowczak Challenging Assumptions of Normality in AES s-Box Configurations under Side-Channel Analysis. Search on Bibsonomy J. Cybersecur. Priv. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
12Shih-Hsiang Lin, Jun-Yi Lee, Chia-Chou Chuang, Narn-Yih Lee, Pei-Yin Chen, Wen-Long Chin Hardware Implementation of High-Throughput S-Box in AES for Information Security. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
12Thockchom Birjit Singha, Roy Paily Palathinkal, Shaik Rafi Ahamed Securing AES Designs Against Power Analysis Attacks: A Survey. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
12Bolin Wang, Wenling Wu New Key-Independent Structural Properties of AES-Like Permutations. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
12Debranjan Pal, Md Rasid Ali, Abhijit Das 0004, Dipanwita Roy Chowdhury A cluster-based practical key recovery attack on reduced-round AES using impossible-differential cryptanalysis. Search on Bibsonomy J. Supercomput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
12P. Rajasekar, H. Mangalam, C. S. Subash Kumar Logic Realization of Galois Field for AES SBOX using Quantum Dot Cellular Automata. Search on Bibsonomy J. Supercomput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
12Priyanka Joshi, Bodhisatwa Mazumdar SPSA: Semi-Permanent Stuck-At fault analysis of AES Rijndael SBox. Search on Bibsonomy J. Cryptogr. Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
12Kunihiro Kuroda, Yuta Fukuda, Kota Yoshida, Takeshi Fujino Practical aspects on non-profiled deep-learning side-channel attacks against AES software implementation with two types of masking countermeasures including RSM. Search on Bibsonomy J. Cryptogr. Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
12Loïc Masure, Rémi Strullu Side-channel analysis against ANSSI's protected AES implementation on ARM: end-to-end attacks with multi-task learning. Search on Bibsonomy J. Cryptogr. Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
12Ayman Altameem, P. Prabu 0001, T. Senthilnathan, Ramesh Chandra Poonia, Abdul Khader Jilani Saudagar A Hybrid AES with a Chaotic Map-Based Biometric Authentication Framework for IoT and Industry 4.0. Search on Bibsonomy Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
12A. Hadj Brahim, Ali-Pacha Adda, Naima Hadj-Said A new image compression-encryption scheme based on compressive sensing & classical AES algorithm. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
12Divyanshu Awasthi, Vinay Kumar Srivastava Hessenberg Decomposition-Based Medical Image Watermarking with Its Performance Comparison by Particle Swarm and JAYA Optimization Algorithms for Different Wavelets and Its Authentication Using AES. Search on Bibsonomy Circuits Syst. Signal Process. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
12Yuta Fukuda, Kota Yoshida, Hisashi Hashimoto, Kunihiro Kuroda, Takeshi Fujino Profiling Deep Learning Side-Channel Attacks Using Multi-Label against AES Circuits with RSM Countermeasure. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
12Katsumi Ebina, Rei Ueno, Naofumi Homma Side-Channel Analysis Against SecOC-Compliant AES-CMAC. Search on Bibsonomy IEEE Trans. Circuits Syst. II Express Briefs The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
12Junhyun Song, Kyeongho Lee, Jongsun Park 0001 Low Area and Low Power Threshold Implementation Design Technique for AES S-Box. Search on Bibsonomy IEEE Trans. Circuits Syst. II Express Briefs The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
12Xiaofeng Xie, Tian Tian 0004 Structural evaluation of AES-like ciphers against mixture differential cryptanalysis. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
12Xueping Yan, Lin Tan 0003, Wenfeng Qi 0001 Non-Existence of One-Byte Active Impossible Differentials for 5-Round AES in the Master-Key Setting. Search on Bibsonomy J. Syst. Sci. Complex. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
12Yohaï-Eliel Berreby, Laurent Sauvage Investigating Efficient Deep Learning Architectures For Side-Channel Attacks on AES. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
12Shubhankar Singh, Anirudh Pupneja, Shivaansh Mital, Cheril Shah, Manish Bawkar, Lakshman Prasad Gupta, Ajit Kumar 0002, Yaman Kumar 0001, Rushali Gupta, Rajiv Ratn Shah H-AES: Towards Automated Essay Scoring for Hindi. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
12Yinsong Xu 0001, Wenjie Liu, Wenbin Yu 0002 Quantum forgery attacks on COPA, AES-COPA and marble authenticated encryption algorithms. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
12Nithyashankari Gummidipoondi Jayasankaran, Hao Guo, Satwik Patnaik, Jeyavijayan Rajendran, Jiang Hu Securing Cloud FPGAs Against Power Side-Channel Attacks: A Case Study on Iterative AES. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
12Francesco Ratto, Luigi Raffo, Francesca Palumbo A multithread AES accelerator for Cyber-Physical Systems. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
12V. Padmanabha Reddy, R. Murali Prasad, Pamula Udayaraju, Bhattu HariPrasad Naik, Ch. Raja Efficient medical image security and transmission using modified LZW compression and ECDH-AES for telemedicine applications. Search on Bibsonomy Soft Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
12Anusha Padmavathi Rajendran, Dhanalakshmi Krishnan Sadhasivam Multi-level attack with dynamic s-box variable key pattern generation for key cohort using AES. Search on Bibsonomy Int. Arab J. Inf. Technol. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
12Qingyuan Yu, Xiaoyang Dong, Lingyue Qin, Yongze Kang, Keting Jia, Xiaoyun Wang 0001, Guoyan Zhang Automatic Search of Meet-in-the-Middle Differential Fault Analysis on AES-like Ciphers. Search on Bibsonomy IACR Trans. Cryptogr. Hardw. Embed. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
12Ryan Swann, James E. Stine Evaluation of a Modular Approach to AES Hardware Architecture and Optimization. Search on Bibsonomy J. Signal Process. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
12Zhiyu Zhang, Siwei Sun, Caibing Wang, Lei Hu Classical and Quantum Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
12Orr Dunkelman, Shibam Ghosh, Nathan Keller, Gaëtan Leurent, Avichai Marmor, Victor Mollimard Partial Sums Meet FFT: Improved Attack on 6-Round AES. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
12Fu Yao, Hua Chen, Yongzhuang Wei, Enes Pasalic, Feng Zhou, Limin Fan Optimizing AES Threshold Implementation under the Glitch-Extended Probing Model. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
12Zhenqiang Li, Fei Gao 0001, Su-Juan Qin, Qiaoyan Wen New record in the number of qubits for a quantum implementation of AES. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
12Sushmit Jahan Rose, Umut Ozkaya, Sabina Yasmin, Suraiya Jabin, Robiul Hasan, Elias Kabir An Efficient Unicode encoded in UTF-16 text cryptography based on the AES algorithm. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
12Haruka Hirata, Daiki Miyahara, Victor Arribas, Yang Li, Noriyuki Miura, Svetla Nikova, Kazuo Sakiyama All You Need Is Fault: Zero-Value Attacks on AES and a New λ-Detection M&M. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
12Tomer Ashur, Erik Takke A New Linear Distinguisher for Four-Round AES. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
12Qun Liu 0006, Bart Preneel, Zheng Zhao, Meiqin Wang Improved Quantum Circuits for AES: Reducing the Depth and the Number of Qubits. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
12Christopher Dunne An Analysis of the Post Quantum and Classical Security of 4x4 and 16x4 S-Boxes and Their Implementations in Simplified-AES. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
12Thomas Marquet, Elisabeth Oswald Exploring multi-task learning in the context of two masked AES implementations. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
12Mariya Georgieva, Sofia Dandjee, Nicolas Gama, Dimitar Jetchev, Dmitry Mikushin Falkor: Federated Learning Secure Aggregation Powered by AES-CTR GPU Implementation. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
12Daphné Trama, Pierre-Emmanuel Clet, Aymen Boudguiga, Renaud Sirdey At Last! A Homomorphic AES Evaluation in Less than 30 Seconds by Means of TFHE. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
12Huimin Li 0004, Guilherme Perin A Systematic Study of Data Augmentation for Protected AES Implementations. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
12Da Lin, Zejun Xiang 0001, Runqing Xu, Shasha Zhang, Xiangyong Zeng Optimized Quantum Implementation of AES. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
12Phithak Thaenkaew, Bruno Quoitin, Ahmed Meddahi Leveraging Larger AES Keys in LoRaWAN: A Practical Evaluation of Energy and Time Costs. Search on Bibsonomy Sensors The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
12Luke Kamrath, Michael E. Baginski, Scott Martin Reduction of Doppler and Range Ambiguity Using AES-192 Encryption-Based Pulse Coding. Search on Bibsonomy Sensors The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
12Yogesh B. Gurav, Bankat M. Patil De-centralized information flow control for cloud virtual machines with hybrid AES-ECC and improved meta-heuristic optimization based optimal key generation. Search on Bibsonomy Int. J. Intell. Robotics Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
12Sunil Kumar, Dilip Kumar 0006 Securing of Cloud Storage Data Using Hybrid AES-ECC Cryptographic Approach. Search on Bibsonomy J. Mobile Multimedia The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
12Zihao Wei, Siwei Sun, Lei Hu, Man Wei, René Peralta 0001 Searching the space of tower field implementations of the 픽28 inverter - with applications to AES, Camellia and SM4. Search on Bibsonomy Int. J. Inf. Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
12Monika Mathur, Nidhi Goel 0001 FPGA implementation of AES encryptor based on rolled and masked approach. Search on Bibsonomy Int. J. Inf. Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
12Da Lin, Zejun Xiang 0001, Runqing Xu, Shasha Zhang, Xiangyong Zeng Optimized quantum implementation of AES. Search on Bibsonomy Quantum Inf. Process. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
12Bin-Bin Cai, Yusen Wu, Jing Dong, Su-Juan Qin, Fei Gao 0001, Qiao-Yan Wen Quantum Attacks on 1K-AES and PRINCE. Search on Bibsonomy Comput. J. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
12Ke Li, Hua Li, Graeme Mund A reconfigurable and compact subpipelined architecture for AES encryption and decryption. Search on Bibsonomy EURASIP J. Adv. Signal Process. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
12Alejandro Cohen, Rafael G. L. D'Oliveira, Ken R. Duffy, Jongchan Woo, Muriel Médard AES as Error Correction: Cryptosystems for Reliable Communication. Search on Bibsonomy IEEE Commun. Lett. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
12Zhiyu Zhang, Siwei Sun, Caibing Wang, Lei Hu Classical and Quantum Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing. Search on Bibsonomy IACR Trans. Symmetric Cryptol. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
12Christina Boura, Patrick Derbez, Margot Funk Related-Key Differential Analysis of the AES. Search on Bibsonomy IACR Trans. Symmetric Cryptol. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
12Aurélien Boeuf, Anne Canteaut, Léo Perrin Propagation of Subspaces in Primitives with Monomial Sboxes: Applications to Rescue and Variants of the AES. Search on Bibsonomy IACR Trans. Symmetric Cryptol. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
12Sandip Kumar Mondal, Mostafizar Rahman, Santanu Sarkar 0001, Avishek Adhikari Revisiting Yoyo Tricks on AES. Search on Bibsonomy IACR Trans. Symmetric Cryptol. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
Displaying result #501 - #600 of 2665 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license