|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1145 occurrences of 417 keywords
|
|
|
Results
Found 2665 publication records. Showing 2665 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
15 | Anand Raghunathan, Nachiketh R. Potlapally, Srivaths Ravi 0001 |
Securing Wireless Data: System Architecture Challenges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSS ![In: Proceedings of the 15th International Symposium on System Synthesis (ISSS 2002), October 2-4, 2002, Kyoto, Japan, pp. 195-200, 2002, ACM / IEEE Computer Society, 1-58113-576-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
WTLS, security, performance, mobile computing, embedded system, wireless communications, encryption, AES, RSA, design methodology, system architecture, platform, DES, IPSec, SSL, decryption, handset, 3DES, security processing |
15 | Hiroto Yasuura, Hiroyuki Tomiyama, Takanori Okuma, Yun Cao |
Data Memory Design Considering Effective Bitwidth for Low-Energy Embedded Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSS ![In: Proceedings of the 15th International Symposium on System Synthesis (ISSS 2002), October 2-4, 2002, Kyoto, Japan, pp. 201-206, 2002, ACM / IEEE Computer Society, 1-58113-576-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
WTLS, security, performance, mobile computing, embedded system, wireless communications, encryption, AES, RSA, design methodology, system architecture, platform, DES, IPSec, SSL, decryption, handset, 3DES, security processing |
15 | Phillip Rogaway, Mihir Bellare, John Black, Ted Krovetz |
OCB: a block-cipher mode of operation for efficient authenticated encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS 2001, Proceedings of the 8th ACM Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001., pp. 196-205, 2001, ACM, 1-58113-385-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
authenticity, cryptography, integrity, standards, encryption, block ciphers, AES, provable security, modes of operation |
14 | Howard M. Heys, Liang Zhang |
Pipelined Statistical Cipher Feedback: A New Mode for High-Speed Self-Synchronizing Stream Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 60(11), pp. 1581-1595, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
Cryptography, synchronization, stream ciphers, block ciphers, advanced encryption standard (AES), mode of operation, error propagation |
14 | Maricel O. Balitanas, Rosslin John Robles, Nayoun Kim, Tai-Hoon Kim |
Crossed Crypto-Scheme in WPA PSK Mode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BLISS ![In: 2009 Symposium on Bio-inspired Learning and Intelligent Systems for Security, BLISS 2009, Edingburgh, United Kingdom, August 20-21 2009, pp. 102-106, 2009, IEEE Computer Society, 978-0-7695-3754-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
cryptography, wireless, Advanced Encryption Standard (AES), Elliptic Curve Cryptography (ECC), WPA |
14 | Ted Huffmire, Brett Brotherton, Nick Callegari, Jonathan Valamehr, Jeff White, Ryan Kastner, Timothy Sherwood |
Designing secure systems on reconfigurable hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Design Autom. Electr. Syst. ![In: ACM Trans. Design Autom. Electr. Syst. 13(3), pp. 44:1-44:24, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
controlled sharing, enforcement mechanisms, security primitives, Field programmable gate arrays (FPGAs), static analysis, advanced encryption standard (AES), security policies, systems-on-a-chip (SoCs), separation, isolation, memory protection, reference monitors, hardware security, execution monitors |
14 | Giorgio Di Natale, M. Doulcier, Marie-Lise Flottes, Bruno Rouzeyre |
A Reliable Architecture for the Advanced Encryption Standard. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ETS ![In: 13th European Test Symposium, ETS 2008, Verbania, Italy, May 25-29, 2008, pp. 13-18, 2008, IEEE Computer Society, 978-0-7695-3150-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
AES cryptochip, On-Line Self-Test, Reliability |
14 | An'an Luo, Chuang Lin 0002, Zhen Chen 0001, Xuehai Peng, Peter D. Ungsunan |
TNC-compatible NAC System implemented on Network Processor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: 32nd Annual IEEE Conference on Local Computer Networks (LCN 2007), 15-18 October 2007, Clontarf Castle, Dublin, Ireland, Proceedings, pp. 1069-1075, 2007, IEEE Computer Society, 0-7695-3000-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
TNC, AES algorithm, network processor, network access control |
12 | Xueping Yan, Lin Tan 0003, Hong Xu 0008, Wen-Feng Qi 0001 |
Improved mixture differential attacks on 6-round AES-like ciphers towards time and data complexities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Secur. Appl. ![In: J. Inf. Secur. Appl. 80, pp. 103661, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Raghavan Kumar, Avinash L. Varna, Carlos Tokunaga, Sachin Taneja, Vivek De, Sanu K. Mathew |
A 100-Gbps Fault-Injection Attack-Resistant AES-256 Engine With 99.1%-99.99% Error Coverage in Intel 4 CMOS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE J. Solid State Circuits ![In: IEEE J. Solid State Circuits 59(1), pp. 79-89, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Sunday Adeola Ajagbe, Oluwashola David Adeniji, Adedayo Amos Olayiwola, Seun Femi Abiona |
Advanced Encryption Standard (AES)-Based Text Encryption for Near Field Communication (NFC) Using Huffman Compression. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SN Comput. Sci. ![In: SN Comput. Sci. 5(1), pp. 156, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Samira Abboud, Nabil Abdoun |
Enhancing LoRaWAN Security: An Advanced AES-Based Cryptographic Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 12, pp. 2589-2606, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Mohammed Y. Shakor, Mustafa Ibrahim Khaleel, Mejdl S. Safran, Sultan Alfarhood, Michelle Zhu |
Dynamic AES Encryption and Blockchain Key Management: A Novel Solution for Cloud Data Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 12, pp. 26334-26343, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Tran Thi Luong, Nguyen Ngoc Cuong, Bay Vo |
AES Security Improvement by Utilizing New Key-Dependent XOR Tables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 12, pp. 53158-53177, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Anit Kumar Ghosal, Amit Sardar, Dipanwita Roychowdhury |
Differential fault analysis attack-tolerant hardware implementation of AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Supercomput. ![In: J. Supercomput. 80(4), pp. 4648-4681, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Jing-yu Sun, Hong Cai, Hao Zhang 0061 |
A novel image encryption algorithm combined complex order chaotic system and modified AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 83(14), pp. 40361-40376, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Firat Artuger, Fatih Özkaynak |
A new algorithm to generate aes-like substitution boxes based on sine cosine optimization algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 83(13), pp. 38949-38964, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Shikha Gupta, Satbir Jain, Mohit Agarwal, Nalin Nanda |
An encryption approach to improve the security and performance of data by integrating AES with a modified OTP technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Adv. Intell. Paradigms ![In: Int. J. Adv. Intell. Paradigms 27(2), pp. 129-149, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Nicolas David 0001, María Naya-Plasencia, André Schrottenloher |
Quantum impossible differential attacks: applications to AES and SKINNY. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 92(3), pp. 723-751, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Jiqiang Lu, Wenchang Zhou |
Improved meet-in-the-middle attack on 10 rounds of the AES-256 block cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 92(4), pp. 957-973, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Ming-Bo Lin, Jen-Hua Chuang |
The Design of a High-Throughput Hardware Architecture for the AES-GCM Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Consumer Electron. ![In: IEEE Trans. Consumer Electron. 70(1), pp. 425-432, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Barbara Gigerl, Franz Klug, Stefan Mangard, Florian Mendel, Robert Primas |
Smooth Passage with the Guards: Second-Order Hardware Masking of the AES with Low Randomness and Low Latency. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Trans. Cryptogr. Hardw. Embed. Syst. ![In: IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(1), pp. 309-335, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Haruka Hirata, Daiki Miyahara, Victor Arribas, Yang Li 0001, Noriyuki Miura, Svetla Nikova, Kazuo Sakiyama |
All You Need Is Fault: Zero-Value Attacks on AES and a New λ-Detection M&M. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Trans. Cryptogr. Hardw. Embed. Syst. ![In: IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(1), pp. 133-156, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Haotian Shi, Xiutao Feng |
Quantum Circuits of AES with a Low-depth Linear Layer and a New Structure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2024, pp. 381, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP BibTeX RDF |
|
12 | Xiaoyang Dong, Jian Guo 0001, Shun Li, Phuong Pham, Tianyu Zhang |
Improved Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2024, pp. 352, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP BibTeX RDF |
|
12 | Shiyao Chen, Jian Guo 0001, Eik List, Danping Shi, Tianyu Zhang |
Diving Deep into the Preimage Security of AES-like Hashing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2024, pp. 300, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP BibTeX RDF |
|
12 | Christoph Dobraunig, Krystian Matusiewicz, Bart Mennink, Alexander Tereschenko |
Efficient Instances of Docked Double Decker With AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2024, pp. 84, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP BibTeX RDF |
|
12 | Hosein Hadipour, Patrick Derbez, Maria Eichlseder |
Revisiting Differential-Linear Attacks via a Boomerang Perspective with Application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2024, pp. 255, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP BibTeX RDF |
|
12 | Christina Boura, Patrick Derbez, Margot Funk |
Alternative Key Schedules for the AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2024, pp. 315, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP BibTeX RDF |
|
12 | Tran Thi Luong, Linh Hoang Dinh |
On generating new key dependent XOR tables to improve AES security and evaluating the randomness of the output of block ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Comput. Secur. ![In: Int. J. Inf. Comput. Secur. 23(1), pp. 16-39, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Li Zhang, Yu Zhang, Wenling Wu, Yongxia Mao, Yafei Zheng |
Explicit Upper Bound Of Impossible Differentials For AES-Like Ciphers: Application To uBlock And Midori. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. J. ![In: Comput. J. 67(2), pp. 674-687, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Xiaoyang Dong, Jian Guo 0001, Shun Li, Phuong Pham, Tianyu Zhang |
Improved Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Trans. Symmetric Cryptol. ![In: IACR Trans. Symmetric Cryptol. 2024(1), pp. 158-187, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Patrick Derbez, Pierre-Alain Fouque, Takanori Isobe 0001, Mostafizar Rahman, André Schrottenloher |
Key Committing Attacks against AES-based AEAD Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Trans. Symmetric Cryptol. ![In: IACR Trans. Symmetric Cryptol. 2024(1), pp. 135-157, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Paul Krüger, Stefan Wildermann, Jürgen Teich |
CRESTS: Chronology-based Reconstruction for Side-Channel Trace Segmentation for XTS-AES on Complex Targets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroSec@EUROSYS ![In: Proceedings of the 17th European Workshop on Systems Security, EuroSec 2024, Athens, Greece, 22 April 2024, pp. 37-43, 2024, ACM. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Nicolas Belleville, Loïc Masure |
Combining Loop Shuffling and Code PolyMorphism for Enhanced AES Side-Channel Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COSADE ![In: Constructive Side-Channel Analysis and Secure Design - 15th International Workshop, COSADE 2024, Gardanne, France, April 9-10, 2024, Proceedings, pp. 260-280, 2024, Springer, 978-3-031-57542-6. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Thomas Marquet, Elisabeth Oswald |
Exploring Multi-task Learning in the Context of Masked AES Implementations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COSADE ![In: Constructive Side-Channel Analysis and Secure Design - 15th International Workshop, COSADE 2024, Gardanne, France, April 9-10, 2024, Proceedings, pp. 93-112, 2024, Springer, 978-3-031-57542-6. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Yuto Miura, Hiroki Nishikawa, Xiangbo Kong, Hiroyuki Tomiyama |
Impacts of Clock Frequency and Sampling Intervals on Power Side-Channel Leakage of AES Circuits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEIC ![In: International Conference on Electronics, Information, and Communication, ICEIC 2024, Taipei, Taiwan, January 28-31, 2024, pp. 1-2, 2024, IEEE, 979-8-3503-7188-8. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Christina Boura, Patrick Derbez, Margot Funk |
Alternative Key Schedules for the AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS (2) ![In: Applied Cryptography and Network Security - 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part II, pp. 485-506, 2024, Springer, 978-3-031-54772-0. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Orr Dunkelman, Shibam Ghosh, Nathan Keller, Gaëtan Leurent, Avichai Marmor, Victor Mollimard |
Partial Sums Meet FFT: Improved Attack on 6-Round AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT (1) ![In: Advances in Cryptology - EUROCRYPT 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part I, pp. 128-157, 2024, Springer, 978-3-031-58715-3. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Shiyao Chen, Jian Guo 0001, Eik List, Danping Shi, Tianyu Zhang |
Diving Deep into the Preimage Security of AES-Like Hashing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT (1) ![In: Advances in Cryptology - EUROCRYPT 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part I, pp. 398-426, 2024, Springer, 978-3-031-58715-3. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Sirish Oruganti, Meizhi Wang, Vishnuvardhan V. Iyer, Yipeng Wang 0017, Mengtian Yang, Raghavan Kumar, Sanu K. Mathew, Jaydeep P. Kulkarni |
Power and EM Side-Channel-Attack-Resilient AES-128 Core with Round-Aligned Globally-Synchronous-Locally-Asynchronous Operation Based on Tunable Replica Circuits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSCC ![In: IEEE International Solid-State Circuits Conference, ISSCC 2024, San Francisco, CA, USA, February 18-22, 2024, pp. 308-310, 2024, IEEE, 979-8-3503-0620-0. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Jiqiang Lu, Wenchang Zhou |
Improved Meet-in-the-Middle Attacks on Nine Rounds of the AES-192 Block Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2024 - Cryptographers' Track at the RSA Conference 2024, San Francisco, CA, USA, May 6-9, 2024, Proceedings, pp. 136-159, 2024, Springer, 978-3-031-58867-9. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Huwaida T. Elshoush, Roua M. Mohammed, Mona T. Abdelhameed, Amel F. Mohammed |
Mitigating Man-in-the-middle Attack In Online Payment System Transaction Using Polymorphic AES Encryption Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Hiding Multim. Signal Process. ![In: J. Inf. Hiding Multim. Signal Process. 14(3), pp. 102-112, September 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
12 | Raghavan Kumar, Vikram B. Suresh, Sachin Taneja, Mark A. Anders 0001, Steven Hsu, Amit Agarwal 0001, Vivek De, Sanu K. Mathew |
A 7-Gbps SCA-Resistant Multiplicative-Masked AES Engine in Intel 4 CMOS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE J. Solid State Circuits ![In: IEEE J. Solid State Circuits 58(4), pp. 1106-1116, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | M. Naim, A. Ali Pacha |
New chaotic satellite image encryption by using some or all the rounds of the AES algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Secur. J. A Glob. Perspect. ![In: Inf. Secur. J. A Glob. Perspect. 32(3), pp. 187-211, May 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Farah Tawfiq Abdul Hussien, Teaba Wala Aldeen Khairi |
Performance Evaluation of AES, ECC and Logistic Chaotic Map Algorithms in Image Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Interact. Mob. Technol. ![In: Int. J. Interact. Mob. Technol. 17(10), pp. 193-211, May 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Clay Carper, Stone Olguin, Jarek Brown, Caylie Charlton, Mike Borowczak |
Challenging Assumptions of Normality in AES s-Box Configurations under Side-Channel Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cybersecur. Priv. ![In: J. Cybersecur. Priv. 3(4), pp. 844-857, November 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Shih-Hsiang Lin, Jun-Yi Lee, Chia-Chou Chuang, Narn-Yih Lee, Pei-Yin Chen, Wen-Long Chin |
Hardware Implementation of High-Throughput S-Box in AES for Information Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 11, pp. 59049-59058, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Thockchom Birjit Singha, Roy Paily Palathinkal, Shaik Rafi Ahamed |
Securing AES Designs Against Power Analysis Attacks: A Survey. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 10(16), pp. 14332-14356, August 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Bolin Wang, Wenling Wu |
New Key-Independent Structural Properties of AES-Like Permutations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 10(1), pp. 575-583, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Debranjan Pal, Md Rasid Ali, Abhijit Das 0004, Dipanwita Roy Chowdhury |
A cluster-based practical key recovery attack on reduced-round AES using impossible-differential cryptanalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Supercomput. ![In: J. Supercomput. 79(6), pp. 6252-6289, April 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | P. Rajasekar, H. Mangalam, C. S. Subash Kumar |
Logic Realization of Galois Field for AES SBOX using Quantum Dot Cellular Automata. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Supercomput. ![In: J. Supercomput. 79(3), pp. 3024-3054, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Priyanka Joshi, Bodhisatwa Mazumdar |
SPSA: Semi-Permanent Stuck-At fault analysis of AES Rijndael SBox. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptogr. Eng. ![In: J. Cryptogr. Eng. 13(2), pp. 201-222, June 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Kunihiro Kuroda, Yuta Fukuda, Kota Yoshida, Takeshi Fujino |
Practical aspects on non-profiled deep-learning side-channel attacks against AES software implementation with two types of masking countermeasures including RSM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptogr. Eng. ![In: J. Cryptogr. Eng. 13(4), pp. 427-442, November 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Loïc Masure, Rémi Strullu |
Side-channel analysis against ANSSI's protected AES implementation on ARM: end-to-end attacks with multi-task learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptogr. Eng. ![In: J. Cryptogr. Eng. 13(2), pp. 129-147, June 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Ayman Altameem, P. Prabu 0001, T. Senthilnathan, Ramesh Chandra Poonia, Abdul Khader Jilani Saudagar |
A Hybrid AES with a Chaotic Map-Based Biometric Authentication Framework for IoT and Industry 4.0. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Syst. ![In: Syst. 11(1), pp. 28, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | A. Hadj Brahim, Ali-Pacha Adda, Naima Hadj-Said |
A new image compression-encryption scheme based on compressive sensing & classical AES algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 82(27), pp. 42087-42117, November 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Divyanshu Awasthi, Vinay Kumar Srivastava |
Hessenberg Decomposition-Based Medical Image Watermarking with Its Performance Comparison by Particle Swarm and JAYA Optimization Algorithms for Different Wavelets and Its Authentication Using AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Circuits Syst. Signal Process. ![In: Circuits Syst. Signal Process. 42(8), pp. 4953-4984, August 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Yuta Fukuda, Kota Yoshida, Hisashi Hashimoto, Kunihiro Kuroda, Takeshi Fujino |
Profiling Deep Learning Side-Channel Attacks Using Multi-Label against AES Circuits with RSM Countermeasure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 106(3), pp. 294-305, March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Katsumi Ebina, Rei Ueno, Naofumi Homma |
Side-Channel Analysis Against SecOC-Compliant AES-CMAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Circuits Syst. II Express Briefs ![In: IEEE Trans. Circuits Syst. II Express Briefs 70(10), pp. 3772-3776, October 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Junhyun Song, Kyeongho Lee, Jongsun Park 0001 |
Low Area and Low Power Threshold Implementation Design Technique for AES S-Box. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Circuits Syst. II Express Briefs ![In: IEEE Trans. Circuits Syst. II Express Briefs 70(3), pp. 1169-1173, March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Xiaofeng Xie, Tian Tian 0004 |
Structural evaluation of AES-like ciphers against mixture differential cryptanalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 91(12), pp. 3881-3899, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Xueping Yan, Lin Tan 0003, Wenfeng Qi 0001 |
Non-Existence of One-Byte Active Impossible Differentials for 5-Round AES in the Master-Key Setting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Syst. Sci. Complex. ![In: J. Syst. Sci. Complex. 36(3), pp. 1336-1350, June 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Yohaï-Eliel Berreby, Laurent Sauvage |
Investigating Efficient Deep Learning Architectures For Side-Channel Attacks on AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2309.13170, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Shubhankar Singh, Anirudh Pupneja, Shivaansh Mital, Cheril Shah, Manish Bawkar, Lakshman Prasad Gupta, Ajit Kumar 0002, Yaman Kumar 0001, Rushali Gupta, Rajiv Ratn Shah |
H-AES: Towards Automated Essay Scoring for Hindi. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2302.14635, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Yinsong Xu 0001, Wenjie Liu, Wenbin Yu 0002 |
Quantum forgery attacks on COPA, AES-COPA and marble authenticated encryption algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2309.14368, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Nithyashankari Gummidipoondi Jayasankaran, Hao Guo, Satwik Patnaik, Jeyavijayan Rajendran, Jiang Hu |
Securing Cloud FPGAs Against Power Side-Channel Attacks: A Case Study on Iterative AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2307.02569, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Francesco Ratto, Luigi Raffo, Francesca Palumbo |
A multithread AES accelerator for Cyber-Physical Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2306.10788, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | V. Padmanabha Reddy, R. Murali Prasad, Pamula Udayaraju, Bhattu HariPrasad Naik, Ch. Raja |
Efficient medical image security and transmission using modified LZW compression and ECDH-AES for telemedicine applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Soft Comput. ![In: Soft Comput. 27(13), pp. 9151-9168, July 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Anusha Padmavathi Rajendran, Dhanalakshmi Krishnan Sadhasivam |
Multi-level attack with dynamic s-box variable key pattern generation for key cohort using AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. Arab J. Inf. Technol. ![In: Int. Arab J. Inf. Technol. 20(5), pp. 748-757, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Qingyuan Yu, Xiaoyang Dong, Lingyue Qin, Yongze Kang, Keting Jia, Xiaoyun Wang 0001, Guoyan Zhang |
Automatic Search of Meet-in-the-Middle Differential Fault Analysis on AES-like Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Trans. Cryptogr. Hardw. Embed. Syst. ![In: IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(4), pp. 1-31, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Ryan Swann, James E. Stine |
Evaluation of a Modular Approach to AES Hardware Architecture and Optimization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Signal Process. Syst. ![In: J. Signal Process. Syst. 95(7), pp. 797-813, July 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Zhiyu Zhang, Siwei Sun, Caibing Wang, Lei Hu |
Classical and Quantum Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 772, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
12 | Orr Dunkelman, Shibam Ghosh, Nathan Keller, Gaëtan Leurent, Avichai Marmor, Victor Mollimard |
Partial Sums Meet FFT: Improved Attack on 6-Round AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 1659, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
12 | Fu Yao, Hua Chen, Yongzhuang Wei, Enes Pasalic, Feng Zhou, Limin Fan |
Optimizing AES Threshold Implementation under the Glitch-Extended Probing Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 1856, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
12 | Zhenqiang Li, Fei Gao 0001, Su-Juan Qin, Qiaoyan Wen |
New record in the number of qubits for a quantum implementation of AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 18, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
12 | Sushmit Jahan Rose, Umut Ozkaya, Sabina Yasmin, Suraiya Jabin, Robiul Hasan, Elias Kabir |
An Efficient Unicode encoded in UTF-16 text cryptography based on the AES algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 1104, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
12 | Haruka Hirata, Daiki Miyahara, Victor Arribas, Yang Li, Noriyuki Miura, Svetla Nikova, Kazuo Sakiyama |
All You Need Is Fault: Zero-Value Attacks on AES and a New λ-Detection M&M. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 1129, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
12 | Tomer Ashur, Erik Takke |
A New Linear Distinguisher for Four-Round AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 398, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
12 | Qun Liu 0006, Bart Preneel, Zheng Zhao, Meiqin Wang |
Improved Quantum Circuits for AES: Reducing the Depth and the Number of Qubits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 1417, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
12 | Christopher Dunne |
An Analysis of the Post Quantum and Classical Security of 4x4 and 16x4 S-Boxes and Their Implementations in Simplified-AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 339, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
12 | Thomas Marquet, Elisabeth Oswald |
Exploring multi-task learning in the context of two masked AES implementations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 6, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
12 | Mariya Georgieva, Sofia Dandjee, Nicolas Gama, Dimitar Jetchev, Dmitry Mikushin |
Falkor: Federated Learning Secure Aggregation Powered by AES-CTR GPU Implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 804, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
12 | Daphné Trama, Pierre-Emmanuel Clet, Aymen Boudguiga, Renaud Sirdey |
At Last! A Homomorphic AES Evaluation in Less than 30 Seconds by Means of TFHE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 1020, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
12 | Huimin Li 0004, Guilherme Perin |
A Systematic Study of Data Augmentation for Protected AES Implementations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 1179, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
12 | Da Lin, Zejun Xiang 0001, Runqing Xu, Shasha Zhang, Xiangyong Zeng |
Optimized Quantum Implementation of AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 146, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
12 | Phithak Thaenkaew, Bruno Quoitin, Ahmed Meddahi |
Leveraging Larger AES Keys in LoRaWAN: A Practical Evaluation of Energy and Time Costs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 23(22), pp. 9172, November 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Luke Kamrath, Michael E. Baginski, Scott Martin |
Reduction of Doppler and Range Ambiguity Using AES-192 Encryption-Based Pulse Coding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 23(5), pp. 2568, March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Yogesh B. Gurav, Bankat M. Patil |
De-centralized information flow control for cloud virtual machines with hybrid AES-ECC and improved meta-heuristic optimization based optimal key generation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Intell. Robotics Appl. ![In: Int. J. Intell. Robotics Appl. 7(2), pp. 406-425, June 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Sunil Kumar, Dilip Kumar 0006 |
Securing of Cloud Storage Data Using Hybrid AES-ECC Cryptographic Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Mobile Multimedia ![In: J. Mobile Multimedia 19(2), pp. 363-388, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Zihao Wei, Siwei Sun, Lei Hu, Man Wei, René Peralta 0001 |
Searching the space of tower field implementations of the 픽28 inverter - with applications to AES, Camellia and SM4. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Comput. Secur. ![In: Int. J. Inf. Comput. Secur. 20(1/2), pp. 1-26, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Monika Mathur, Nidhi Goel 0001 |
FPGA implementation of AES encryptor based on rolled and masked approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Comput. Secur. ![In: Int. J. Inf. Comput. Secur. 21(1/2), pp. 1-18, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Da Lin, Zejun Xiang 0001, Runqing Xu, Shasha Zhang, Xiangyong Zeng |
Optimized quantum implementation of AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Quantum Inf. Process. ![In: Quantum Inf. Process. 22(9), pp. 352, September 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Bin-Bin Cai, Yusen Wu, Jing Dong, Su-Juan Qin, Fei Gao 0001, Qiao-Yan Wen |
Quantum Attacks on 1K-AES and PRINCE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. J. ![In: Comput. J. 66(5), pp. 1102-1110, May 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Ke Li, Hua Li, Graeme Mund |
A reconfigurable and compact subpipelined architecture for AES encryption and decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EURASIP J. Adv. Signal Process. ![In: EURASIP J. Adv. Signal Process. 2023(1), pp. 5, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Alejandro Cohen, Rafael G. L. D'Oliveira, Ken R. Duffy, Jongchan Woo, Muriel Médard |
AES as Error Correction: Cryptosystems for Reliable Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Commun. Lett. ![In: IEEE Commun. Lett. 27(8), pp. 1964-1968, August 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Zhiyu Zhang, Siwei Sun, Caibing Wang, Lei Hu |
Classical and Quantum Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Trans. Symmetric Cryptol. ![In: IACR Trans. Symmetric Cryptol. 2023(2), pp. 224-252, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Christina Boura, Patrick Derbez, Margot Funk |
Related-Key Differential Analysis of the AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Trans. Symmetric Cryptol. ![In: IACR Trans. Symmetric Cryptol. 2023(4), pp. 215-243, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Aurélien Boeuf, Anne Canteaut, Léo Perrin |
Propagation of Subspaces in Primitives with Monomial Sboxes: Applications to Rescue and Variants of the AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Trans. Symmetric Cryptol. ![In: IACR Trans. Symmetric Cryptol. 2023(4), pp. 270-298, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Sandip Kumar Mondal, Mostafizar Rahman, Santanu Sarkar 0001, Avishek Adhikari |
Revisiting Yoyo Tricks on AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Trans. Symmetric Cryptol. ![In: IACR Trans. Symmetric Cryptol. 2023(4), pp. 28-57, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
Displaying result #501 - #600 of 2665 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ >>] |
|