|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 293 occurrences of 177 keywords
|
|
|
Results
Found 543 publication records. Showing 543 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
6 | Liang Li, Jun Han 0003, Xiaoyang Zeng, Jia Zhao |
A full-custom design of AES SubByte module with signal independent power consumption. |
ISCAS |
2008 |
DBLP DOI BibTeX RDF |
|
6 | Massimo Alioto, Massimo Poli, Santina Rocchi |
A general model for differential power analysis attacks to static logic circuits. |
ISCAS |
2008 |
DBLP DOI BibTeX RDF |
|
6 | Jiaming He, Hongbin Zhang |
Digital Right Management Model Based on Cryptography and Digital Watermarking. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
6 | Huawei Zhao, Jing Qin 0002, Zhifeng Fang |
Converters for Designing Applied Cryptographic Protocols. |
EUC (2) |
2008 |
DBLP DOI BibTeX RDF |
|
6 | Abhishek Gupta, Joy Kuri |
Deterministic schemes for key distribution in wireless sensor networks. |
COMSWARE |
2008 |
DBLP DOI BibTeX RDF |
|
6 | Jason Reid, Juan Manuel González Nieto, Tee Tang, Bouchra Senadji |
Detecting relay attacks with timing-based protocols. |
AsiaCCS |
2007 |
DBLP DOI BibTeX RDF |
|
6 | Christoph Krauß, Markus Schneider 0002, Kpatcha M. Bayarou, Claudia Eckert 0001 |
STEF: A Secure Ticket-Based En-route Filtering Scheme for Wireless Sensor Networks. |
ARES |
2007 |
DBLP DOI BibTeX RDF |
|
6 | Nadia Nedjah, Luiza de Macedo Mourelle |
Evolutionary Design of Resilient Substitution Boxes: From Coding to Hardware Implementation. |
ICES |
2007 |
DBLP DOI BibTeX RDF |
|
6 | Saar Drimer |
Authentication of FPGA Bitstreams: Why and How. |
ARC |
2007 |
DBLP DOI BibTeX RDF |
|
6 | Jesús Téllez Isaac, José Sierra Camara |
An Anonymous Account-Based Mobile Payment Protocol for a Restricted Connectivity Scenario. |
DEXA Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
6 | Kris Tiri, Onur Aciiçmez, Michael Neve, Flemming Andersen |
An Analytical Model for Time-Driven Cache Attacks. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
|
6 | Zhen-Ai Jin, Hyun-Ju Cho, Kee-Young Yoo |
An Efficient Authentication Protocol for Low-Cost RFID Systems. |
KES-AMSTA |
2007 |
DBLP DOI BibTeX RDF |
security, Authentication, RFID, location privacy, symmetric encryption |
6 | Matteo Giaconia, Marco Macchetti, Francesco Regazzoni 0001, Kai Schramm |
Area and Power Efficient Synthesis of DPA-Resistant Cryptographic S-Boxes. |
VLSI Design |
2007 |
DBLP DOI BibTeX RDF |
|
6 | Jun Furukawa 0001, Kazue Sako |
An Efficient Publicly Verifiable Mix-Net for Long Inputs. |
Financial Cryptography |
2006 |
DBLP DOI BibTeX RDF |
Hybrid-mix, efficient, public verifiability, multiple encryption |
6 | Jian Yin 0006, Sanjay Kumar Madria |
A Hierarchical Secure Routing Protocol against Black Hole Attacks in Sensor Networks. |
SUTC (1) |
2006 |
DBLP DOI BibTeX RDF |
Black hole attack, Sensor networks |
6 | Frédéric Muller, Thomas Peyrin |
Cryptanalysis of T-Function-Based Hash Functions. |
ICISC |
2006 |
DBLP DOI BibTeX RDF |
|
6 | Marco Macchetti, Wenyu Chen |
ASIC hardware implementation of the IDEA NXT encryption algorithm. |
ISCAS |
2006 |
DBLP DOI BibTeX RDF |
|
6 | Jesús Téllez Isaac, José Sierra Camara, Antonio Izquierdo Manzanares, Mildrey Carbonell Castro |
Payment in a Kiosk Centric Model with Mobile and Low Computational Power Devices. |
ICCSA (5) |
2006 |
DBLP DOI BibTeX RDF |
|
6 | Kyosuke Osaka, Tsuyoshi Takagi, Kenichi Yamazaki, Osamu Takahashi |
An Efficient and Secure RFID Security Method with Ownership Transfer. |
CIS |
2006 |
DBLP DOI BibTeX RDF |
|
6 | JeaHoon Park, Hoon-Jae Lee 0001, JaeCheol Ha, YongJe Choi, Howon Kim 0001, Sang-Jae Moon |
A Differential Power Analysis Attack of Block Cipher Based on the Hamming Weight of Internal Operation Unit. |
CIS |
2006 |
DBLP DOI BibTeX RDF |
|
6 | Leonardo B. Oliveira, Hao Cho Wang, Antonio Alfredo Ferreira Loureiro |
LHA-SP: secure protocols for hierarchical wireless sensor networks. |
Integrated Network Management |
2005 |
DBLP DOI BibTeX RDF |
|
6 | Jianjun Duan, Joe Hurd, Guodong Li, Scott Owens, Konrad Slind, Junxing Zhang |
Functional Correctness Proofs of Encryption Algorithms. |
LPAR |
2005 |
DBLP DOI BibTeX RDF |
|
6 | William Eric Hall, Charanjit S. Jutla |
Parallelizable Authentication Trees. |
Selected Areas in Cryptography |
2005 |
DBLP DOI BibTeX RDF |
|
6 | Serge Mister, Robert J. Zuccherato |
An Attack on CFB Mode Encryption as Used by OpenPGP. |
Selected Areas in Cryptography |
2005 |
DBLP DOI BibTeX RDF |
Cipher-Feedback Mode, encryption, chosen-ciphertext attacks, OpenPGP |
6 | Marco Macchetti, Mario Caironi, Luca Breveglieri, Alessandra Cherubini |
A Complete Formulation of Generalized Affine Equivalence. |
ICTCS |
2005 |
DBLP DOI BibTeX RDF |
generalized linear equivalence, Boolean functions, S-boxes, linear cryptanalysis |
6 | Adrian Carlos Ferreira, Marcos Aurélio Vilaça, Leonardo B. Oliveira, Eduardo Habib, Hao Chi Wong, Antonio Alfredo Ferreira Loureiro |
On the Security of Cluster-Based Communication Protocols for Wireless Sensor Networks. |
ICN (1) |
2005 |
DBLP DOI BibTeX RDF |
|
6 | Véronique Cortier, Michaël Rusinowitch, Eugen Zalinescu |
A resolution strategy for verifying cryptographic protocols with CBC encryption and blind signatures. |
PPDP |
2005 |
DBLP DOI BibTeX RDF |
resolution strategies, verification, cryptographic protocols, horn clauses |
6 | Stefan Tillich, Johann Großschädl |
Accelerating AES Using Instruction Set Extensions for Elliptic Curve Cryptography. |
ICCSA (2) |
2005 |
DBLP DOI BibTeX RDF |
32-bit implementation, software acceleration, Advanced Encryption Standard, Rijndael, instruction set extensions |
6 | Spyridon Vassilaras, Dimitrios Vogiatzis, Gregory S. Yovanof |
Misbehavior Detection in Clustered Ad-hoc Networks with Central Control. |
ITCC (2) |
2005 |
DBLP DOI BibTeX RDF |
|
6 | Catherine H. Gebotys, Simon Ho, C. C. Tiu |
EM Analysis of Rijndael and ECC on a Wireless Java-Based PDA. |
CHES |
2005 |
DBLP DOI BibTeX RDF |
|
6 | Thomas J. Wollinger, Jorge Guajardo, Christof Paar |
Security on FPGAs: State-of-the-art implementations and attacks. |
ACM Trans. Embed. Comput. Syst. |
2004 |
DBLP DOI BibTeX RDF |
cryptographic applications, security, FPGA, Cryptography, reverse engineering, attacks, reconfigurable hardware |
6 | Chang-Joo Moon, Dae-Ha Park |
A User Authentication Model for the OSGi Service Platform. |
AsiaSim |
2004 |
DBLP DOI BibTeX RDF |
|
6 | Ari Juels |
Minimalist Cryptography for Low-Cost RFID Tags. |
SCN |
2004 |
DBLP DOI BibTeX RDF |
|
6 | William E. Burr |
Selecting the Advanced Encryption Standard. |
IEEE Secur. Priv. |
2003 |
DBLP DOI BibTeX RDF |
|
6 | Chiara Bodei, Mikael Buchholtz, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson |
Automatic Validation of Protocol Narration. |
CSFW |
2003 |
DBLP DOI BibTeX RDF |
|
6 | Jean-Luc Beuchat |
FPGA Implementations of the RC6 Block Cipher. |
FPL |
2003 |
DBLP DOI BibTeX RDF |
|
6 | Mazleena bt. Salleh, Subariah bt. Ibrahim, I. F. Isnin |
Enhanced chaotic image encryption algorithm based on Baker's map. |
ISCAS (2) |
2003 |
DBLP DOI BibTeX RDF |
|
6 | Yannick Chevalier, Laurent Vigneron |
Automated Unbounded Verification of Security Protocols. |
CAV |
2002 |
DBLP DOI BibTeX RDF |
|
6 | Luis Mengual, Nicolás Barcia, Ernesto Jiménez, Ernestina Menasalvas Ruiz, Julio Setién, Javier Yágüez |
Automatic implementation system of security protocols based on formal description techniques. |
ISCC |
2002 |
DBLP DOI BibTeX RDF |
|
6 | Tim Grembowski, Roar Lien, Kris Gaj, Nghi Nguyen, Peter Bellows, Jaroslav Flidr, Tom Lehman, Brian Schott |
Comparative Analysis of the Hardware Implementations of Hash Functions SHA-1 and SHA-512. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
|
6 | Guido Bertoni, Luca Breveglieri, Pasqualina Fragneto, Marco Macchetti, Stefano Marchesin 0002 |
Efficient Software Implementation of AES on 32-Bit Platforms. |
CHES |
2002 |
DBLP DOI BibTeX RDF |
|
6 | Subhayan Sen, Chandrama Shaw, Dipanwita Roy Chowdhury, Niloy Ganguly, Parimal Pal Chaudhuri |
Cellular Automata Based Cryptosystem (CAC). |
ICICS |
2002 |
DBLP DOI BibTeX RDF |
|
6 | Tamás Horváth 0002, Spyros S. Magliveras, Tran van Trung |
A Parallel Permutation Multiplier for a PGM Crypto-chip. |
CRYPTO |
1994 |
DBLP DOI BibTeX RDF |
|
Displaying result #501 - #543 of 543 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6] |
|