The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase Symmetric-key (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1984-2000 (18) 2001-2002 (16) 2003 (20) 2004 (22) 2005 (41) 2006 (24) 2007 (46) 2008 (50) 2009 (33) 2010 (20) 2011-2012 (24) 2013 (17) 2014 (15) 2015 (17) 2016 (27) 2017 (22) 2018 (18) 2019 (23) 2020 (24) 2021 (25) 2022 (27) 2023-2024 (14)
Publication types (Num. hits)
article(186) book(1) incollection(2) inproceedings(339) phdthesis(15)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 293 occurrences of 177 keywords

Results
Found 543 publication records. Showing 543 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
6Liang Li, Jun Han 0003, Xiaoyang Zeng, Jia Zhao A full-custom design of AES SubByte module with signal independent power consumption. Search on Bibsonomy ISCAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
6Massimo Alioto, Massimo Poli, Santina Rocchi A general model for differential power analysis attacks to static logic circuits. Search on Bibsonomy ISCAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
6Jiaming He, Hongbin Zhang Digital Right Management Model Based on Cryptography and Digital Watermarking. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
6Huawei Zhao, Jing Qin 0002, Zhifeng Fang Converters for Designing Applied Cryptographic Protocols. Search on Bibsonomy EUC (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
6Abhishek Gupta, Joy Kuri Deterministic schemes for key distribution in wireless sensor networks. Search on Bibsonomy COMSWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
6Jason Reid, Juan Manuel González Nieto, Tee Tang, Bouchra Senadji Detecting relay attacks with timing-based protocols. Search on Bibsonomy AsiaCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
6Christoph Krauß, Markus Schneider 0002, Kpatcha M. Bayarou, Claudia Eckert 0001 STEF: A Secure Ticket-Based En-route Filtering Scheme for Wireless Sensor Networks. Search on Bibsonomy ARES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
6Nadia Nedjah, Luiza de Macedo Mourelle Evolutionary Design of Resilient Substitution Boxes: From Coding to Hardware Implementation. Search on Bibsonomy ICES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
6Saar Drimer Authentication of FPGA Bitstreams: Why and How. Search on Bibsonomy ARC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
6Jesús Téllez Isaac, José Sierra Camara An Anonymous Account-Based Mobile Payment Protocol for a Restricted Connectivity Scenario. Search on Bibsonomy DEXA Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
6Kris Tiri, Onur Aciiçmez, Michael Neve, Flemming Andersen An Analytical Model for Time-Driven Cache Attacks. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
6Zhen-Ai Jin, Hyun-Ju Cho, Kee-Young Yoo An Efficient Authentication Protocol for Low-Cost RFID Systems. Search on Bibsonomy KES-AMSTA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, Authentication, RFID, location privacy, symmetric encryption
6Matteo Giaconia, Marco Macchetti, Francesco Regazzoni 0001, Kai Schramm Area and Power Efficient Synthesis of DPA-Resistant Cryptographic S-Boxes. Search on Bibsonomy VLSI Design The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
6Jun Furukawa 0001, Kazue Sako An Efficient Publicly Verifiable Mix-Net for Long Inputs. Search on Bibsonomy Financial Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Hybrid-mix, efficient, public verifiability, multiple encryption
6Jian Yin 0006, Sanjay Kumar Madria A Hierarchical Secure Routing Protocol against Black Hole Attacks in Sensor Networks. Search on Bibsonomy SUTC (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Black hole attack, Sensor networks
6Frédéric Muller, Thomas Peyrin Cryptanalysis of T-Function-Based Hash Functions. Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
6Marco Macchetti, Wenyu Chen ASIC hardware implementation of the IDEA NXT encryption algorithm. Search on Bibsonomy ISCAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
6Jesús Téllez Isaac, José Sierra Camara, Antonio Izquierdo Manzanares, Mildrey Carbonell Castro Payment in a Kiosk Centric Model with Mobile and Low Computational Power Devices. Search on Bibsonomy ICCSA (5) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
6Kyosuke Osaka, Tsuyoshi Takagi, Kenichi Yamazaki, Osamu Takahashi An Efficient and Secure RFID Security Method with Ownership Transfer. Search on Bibsonomy CIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
6JeaHoon Park, Hoon-Jae Lee 0001, JaeCheol Ha, YongJe Choi, Howon Kim 0001, Sang-Jae Moon A Differential Power Analysis Attack of Block Cipher Based on the Hamming Weight of Internal Operation Unit. Search on Bibsonomy CIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
6Leonardo B. Oliveira, Hao Cho Wang, Antonio Alfredo Ferreira Loureiro LHA-SP: secure protocols for hierarchical wireless sensor networks. Search on Bibsonomy Integrated Network Management The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
6Jianjun Duan, Joe Hurd, Guodong Li, Scott Owens, Konrad Slind, Junxing Zhang Functional Correctness Proofs of Encryption Algorithms. Search on Bibsonomy LPAR The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
6William Eric Hall, Charanjit S. Jutla Parallelizable Authentication Trees. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
6Serge Mister, Robert J. Zuccherato An Attack on CFB Mode Encryption as Used by OpenPGP. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Cipher-Feedback Mode, encryption, chosen-ciphertext attacks, OpenPGP
6Marco Macchetti, Mario Caironi, Luca Breveglieri, Alessandra Cherubini A Complete Formulation of Generalized Affine Equivalence. Search on Bibsonomy ICTCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF generalized linear equivalence, Boolean functions, S-boxes, linear cryptanalysis
6Adrian Carlos Ferreira, Marcos Aurélio Vilaça, Leonardo B. Oliveira, Eduardo Habib, Hao Chi Wong, Antonio Alfredo Ferreira Loureiro On the Security of Cluster-Based Communication Protocols for Wireless Sensor Networks. Search on Bibsonomy ICN (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
6Véronique Cortier, Michaël Rusinowitch, Eugen Zalinescu A resolution strategy for verifying cryptographic protocols with CBC encryption and blind signatures. Search on Bibsonomy PPDP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF resolution strategies, verification, cryptographic protocols, horn clauses
6Stefan Tillich, Johann Großschädl Accelerating AES Using Instruction Set Extensions for Elliptic Curve Cryptography. Search on Bibsonomy ICCSA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF 32-bit implementation, software acceleration, Advanced Encryption Standard, Rijndael, instruction set extensions
6Spyridon Vassilaras, Dimitrios Vogiatzis, Gregory S. Yovanof Misbehavior Detection in Clustered Ad-hoc Networks with Central Control. Search on Bibsonomy ITCC (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
6Catherine H. Gebotys, Simon Ho, C. C. Tiu EM Analysis of Rijndael and ECC on a Wireless Java-Based PDA. Search on Bibsonomy CHES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
6Thomas J. Wollinger, Jorge Guajardo, Christof Paar Security on FPGAs: State-of-the-art implementations and attacks. Search on Bibsonomy ACM Trans. Embed. Comput. Syst. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF cryptographic applications, security, FPGA, Cryptography, reverse engineering, attacks, reconfigurable hardware
6Chang-Joo Moon, Dae-Ha Park A User Authentication Model for the OSGi Service Platform. Search on Bibsonomy AsiaSim The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
6Ari Juels Minimalist Cryptography for Low-Cost RFID Tags. Search on Bibsonomy SCN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
6William E. Burr Selecting the Advanced Encryption Standard. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
6Chiara Bodei, Mikael Buchholtz, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson Automatic Validation of Protocol Narration. Search on Bibsonomy CSFW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
6Jean-Luc Beuchat FPGA Implementations of the RC6 Block Cipher. Search on Bibsonomy FPL The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
6Mazleena bt. Salleh, Subariah bt. Ibrahim, I. F. Isnin Enhanced chaotic image encryption algorithm based on Baker's map. Search on Bibsonomy ISCAS (2) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
6Yannick Chevalier, Laurent Vigneron Automated Unbounded Verification of Security Protocols. Search on Bibsonomy CAV The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
6Luis Mengual, Nicolás Barcia, Ernesto Jiménez, Ernestina Menasalvas Ruiz, Julio Setién, Javier Yágüez Automatic implementation system of security protocols based on formal description techniques. Search on Bibsonomy ISCC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
6Tim Grembowski, Roar Lien, Kris Gaj, Nghi Nguyen, Peter Bellows, Jaroslav Flidr, Tom Lehman, Brian Schott Comparative Analysis of the Hardware Implementations of Hash Functions SHA-1 and SHA-512. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
6Guido Bertoni, Luca Breveglieri, Pasqualina Fragneto, Marco Macchetti, Stefano Marchesin 0002 Efficient Software Implementation of AES on 32-Bit Platforms. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
6Subhayan Sen, Chandrama Shaw, Dipanwita Roy Chowdhury, Niloy Ganguly, Parimal Pal Chaudhuri Cellular Automata Based Cryptosystem (CAC). Search on Bibsonomy ICICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
6Tamás Horváth 0002, Spyros S. Magliveras, Tran van Trung A Parallel Permutation Multiplier for a PGM Crypto-chip. Search on Bibsonomy CRYPTO The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
Displaying result #501 - #543 of 543 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license