Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
12 | Anusha Padmavathi Rajendran, Dhanalakshmi Krishnan Sadhasivam |
An Advanced Encryption Standard in Memory (AESIM) Efficient, High Performance S-box Based AES Encryption and Decryption Architecture on VLSI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Pers. Commun. ![In: Wirel. Pers. Commun. 123(4), pp. 3081-3101, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Abdul Razaq 0002, Musheer Ahmad 0002, Awais Yousaf 0001, Moatsum Alawida, Atta Ullah, Umer Shuaib |
A Group Theoretic Construction of Large Number of AES-Like Substitution-Boxes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Pers. Commun. ![In: Wirel. Pers. Commun. 122(3), pp. 2057-2080, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Alejandro Cohen, Rafael G. L. D'Oliveira, Ken R. Duffy, Jongchan Woo, Muriel Médard |
AES as Error Correction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2203.12047, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Seungkwang Lee, Jeong-Nyeo Kim |
Balanced Encoding of Near-Zero Correlation for an AES Implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2207.13559, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Jingyao Zhang 0002, Hoda Naghibijouybari, Elaheh Sadredini |
Sealer: In-SRAM AES for High-Performance and Low-Overhead Memory Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2207.01298, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Utsav Banerjee, Lisa Ho, Skanda Koppula |
Power-Based Side-Channel Attack for AES Key Extraction on the ATMega328 Microcontroller. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2203.08220, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Ziaur Rahman 0003, Xun Yi, Mustain Billah, Mousumi Akter Sumi, Adnan Anwar |
Enhancing AES Using Chaos and Logistic Map-Based Key Generation Technique for Securing IoT-Based Smart Home. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2203.16124, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Mohammad Al-Mashhadani, Mohamed Shujaa |
IoT security using AES encryption technology based ESP32 platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. Arab J. Inf. Technol. ![In: Int. Arab J. Inf. Technol. 19(2), pp. 214-223, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Adoté François-Xavier Ametepe, Arnaud S. R. M. Ahouandjinou, Eugène C. Ezin |
Robust encryption method based on AES-CBC using elliptic curves Diffie-Hellman to secure data in wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Networks ![In: Wirel. Networks 28(3), pp. 991-1001, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Yawen Ke, Xiaofeng Xia |
Timed Automaton-Based Quantitative Feasibility Analysis of Symmetric Cipher in Embedded RTOS: A Case Study of AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 2022, pp. 4118994:1-4118994:16, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Yaacov Belenky, Vadim Bugaenko, Leonid Azriel, Hennadii Chernyshchyk, Ira Dushar, Oleg Karavaev, Oleh Maksimenko, Yulia Ruda, Valery Teper, Yury Kreimer |
Redundancy AES Masking Basis for Attack Mitigation (RAMBAM). ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Trans. Cryptogr. Hardw. Embed. Syst. ![In: IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(2), pp. 69-91, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Xiaoyang Dong, Jian Guo 0001, Shun Li, Phuong Pham |
Triangulating Rebound Attack on AES-like Hashing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 731, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
12 | Mostafizar Rahman, Dhiman Saha, Goutam Paul 0001 |
Boomeyong: Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES and Pholkos. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 25, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
12 | Patrick Derbez, Marie Euler, Pierre-Alain Fouque, Phuong Hoa Nguyen |
Revisiting Related-Key Boomerang attacks on AES using computer-aided tool. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 725, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
12 | Xiaofeng Xie, Tian Tian 0004 |
Structure Evaluation of AES-like Ciphers against Mixture Differential Cryptanalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 1199, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
12 | Marek Bielik, Martin Jurecek, Olha Jurecková, Róbert Lórencz |
Yet Another Algebraic Cryptanalysis of Small Scale Variants of AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 695, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
12 | Ziaur Rahman 0003, Xun Yi, Mustain Billah, Mousumi Akter Sumi, Adnan Anwar |
Enhancing AES Using Chaos and Logistic Map-Based Key Generation Technique for Securing IoT-Based Smart Home. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 410, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
12 | Seonggyeom Kim, Deukjo Hong, Jaechul Sung, Seokhie Hong |
Accelerating the Best Trail Search on AES-Like Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 643, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
12 | Kyungbae Jang, Anubhab Baksi, Hyunji Kim, Gyeongju Song, Hwajeong Seo, Anupam Chattopadhyay |
Quantum Analysis of AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 683, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
12 | Siemen Dhooghe, Aein Rezaei Shahmirzadi, Amir Moradi 0001 |
Second-Order Low-Randomness d+1 Hardware Sharing of the AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 1276, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
12 | Jian Guo 0001, Ling Song 0001, Haoyang Wang 0001 |
Key Structures: Improved Related-Key Boomerang Attack against the Full AES-256. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 845, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
12 | Kosei Sakamoto, Fukang Liu, Yuto Nakano, Shinsaku Kiyomoto, Takanori Isobe 0001 |
Rocca: An Efficient AES-based Encryption Scheme for Beyond 5G (Full version). ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 116, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
12 | Zhenyu Huang 0004, Siwei Sun |
Synthesizing Quantum Circuits of AES with Lower T-depth and Less Qubits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 620, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
12 | Nicolas David 0001, María Naya-Plasencia, André Schrottenloher |
Quantum impossible differential attacks: Applications to AES and SKINNY. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 754, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
12 | Navid Ghaedi Bardeh, Vincent Rijmen |
New Key Recovery Attack on Reduced-Round AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 487, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
12 | Augustin Bariant, Gaëtan Leurent |
Truncated Boomerang Attacks and Application to AES-based Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 701, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
12 | Piyush Kumar Shukla, Amer Aljaedi, Piyush Kumar Pareek, Adel R. Alharbi, Sajjad Shaukat Jamal |
AES Based White Box Cryptography in Digital Signature Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 22(23), pp. 9444, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Xin Liu, An Wang 0001, Liehuang Zhu, Yaoling Ding, Zeyuan Lyu, Zongyue Wang |
SCARE and power attack on AES-like block ciphers with secret S-box. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Frontiers Comput. Sci. ![In: Frontiers Comput. Sci. 16(4), pp. 164814, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Seungjun Baek 0002, Sehee Cho, Jongsung Kim |
Quantum cryptanalysis of the full AES-256-based Davies-Meyer, Hirose and MJH hash functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Quantum Inf. Process. ![In: Quantum Inf. Process. 21(4), pp. 163, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Xiaoqiang Zhang 0001, Lan Tang, Xinggan Zhang, Xinxing Zheng, Mingyu Xu, Fan Yang |
Low delay AES S-box designs based on matrix merging method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Electron. Express ![In: IEICE Electron. Express 19(11), pp. 20220154, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Yiding Liu, Lening Wang, Amer Qouneh, Xin Fu |
Enabling PIM-based AES encryption for online video streaming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Syst. Archit. ![In: J. Syst. Archit. 132, pp. 102734, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Seonggyeom Kim, Deukjo Hong, Jaechul Sung, Seokhie Hong |
Accelerating the Best Trail Search on AES-Like Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Trans. Symmetric Cryptol. ![In: IACR Trans. Symmetric Cryptol. 2022(2), pp. 201-252, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Navid Ghaedi Bardeh, Vincent Rijmen |
New Key-Recovery Attack on Reduced-Round AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Trans. Symmetric Cryptol. ![In: IACR Trans. Symmetric Cryptol. 2022(2), pp. 43-62, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Anit Kumar Ghosal |
A Better MixColumns Matrix to AES Against Differential Fault Analysis Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATIS ![In: Applications and Techniques in Information Security - 13th International Conference, ATIS 2022, Manipal, India, December 30-31, 2022, Revised Selected Papers, pp. 59-70, 2022, Springer, 978-981-99-2263-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Atif Tirmizi, Osama Abuomar |
A Secure API-Driven Framework for AES Modes of Encryption Enhanced with Machine Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EIT ![In: 2022 IEEE International Conference on Electro Information Technology, EIT 2022, Mankato, MN, USA, May 19-21, 2022, pp. 118-124, 2022, IEEE, 978-1-6654-8009-3. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Siemen Dhooghe, Aein Rezaei Shahmirzadi, Amir Moradi 0001 |
Second-Order Low-Randomness d + 1 Hardware Sharing of the AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022, pp. 815-828, 2022, ACM, 978-1-4503-9450-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Andreea Cristina Suiu Cristea, Alexandra Balan |
AES Hardware Implementation Based on FPGA with Improved Throughput. ![Search on Bibsonomy](Pics/bibsonomy.png) |
REV ![In: Artificial Intelligence and Online Engineering - Proceedings of the 19th International Conference on Remote Engineering and Virtual Instrumentation, British University, Cairo, Egypt, 28 February - 2 March 2022., pp. 41-50, 2022, Springer, 978-3-031-17090-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Cory Davis, Eugene John |
Shared Round Core Architecture: A Novel AES Implementation for Implantable Cardiac Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MWSCAS ![In: 65th IEEE International Midwest Symposium on Circuits and Systems, MWSCAS 2022, Fukuoka, Japan, August 7-10, 2022, pp. 1-4, 2022, IEEE, 978-1-6654-0279-8. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Niccolò Cecchinato, Andrea Toma, Carlo Drioli, Giuseppe Oliva, Gianluigi Sechi, Gian Luca Foresti |
A Secure Real-time Multimedia Streaming through Robust and Lightweight AES Encryption in UAV Networks for Operational Scenarios in Military Domain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICMCIS ![In: International Conference on Military Communication and Information Systems, ICMCIS 2022, Udine, Italy, 17-18 May 2022, pp. 50-57, 2022, Elsevier. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Bingnan Zhong, Zicheng Wang, Yinggang Guo, Qingkai Zeng 0002 |
CryptKSP: A Kernel Stack Protection Model Based on AES-NI Hardware Feature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: ICT Systems Security and Privacy Protection - 37th IFIP TC 11 International Conference, SEC 2022, Copenhagen, Denmark, June 13-15, 2022, Proceedings, pp. 270-286, 2022, Springer, 978-3-031-06974-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Oluwashola David Adeniji, Olaniyan Eliais Akinola, Ademola Olusola Adesina, Olamide Afolabi |
Text Encryption with Advanced Encryption Standard (AES) for Near Field Communication (NFC) Using Huffman Compression. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICAI ![In: Applied Informatics: 5th International Conference, ICAI 2022, Arequipa, Peru, October 27-29, 2022, Proceedings, pp. 158-170, 2022, Springer International Publishing, 978-3-031-19647-8. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | José Azócar, Ismael Soto, Sebastián Lara, Sebastián Gutiérrez 0001, Pablo Palacios Játiva, Cesar Azurdia |
Performance analysis of the QKD algorithm using RS and AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSNDSP ![In: 13th International Symposium on Communication Systems, Networks and Digital Signal Processing, CSNDSP 2022, Porto, Portugal, July 20-22, 2022, pp. 344-349, 2022, IEEE, 978-1-6654-1044-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Nicolas Bordes, Paolo Maistri |
Electromagnetic Leakage Assessment of a Proven Higher-Order Masking of AES S-Box. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSD ![In: 25th Euromicro Conference on Digital System Design, DSD 2022, Maspalomas, Spain, August 31 - Sept. 2, 2022, pp. 520-527, 2022, IEEE, 978-1-6654-7404-7. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Assaad El Makhloufi, Samir El Adib, Naoufal Raissouni |
High Throughput Implementation of AES Algorithm Using Radiation Tolerant FPGA for Secure LST-SW Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CommNet ![In: 5th International Conference on Advanced Communication Technologies and Networking, CommNet 2022, Marrakech, Morocco, December 12-14, 2022, pp. 1-6, 2022, IEEE, 978-1-6654-5054-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Chengqi Hou, Wei Yang, Zhiming Zhang, Qinghua Liu, Jianmao Xiao |
Secure Communication for 6TiSCH Wireless Networks Based on Hybrid ECC and AES Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MONAMI ![In: Mobile Networks and Management - 12th EAI International Conference, MONAMI 2022, Virtual Event, October 29-31, 2022, Proceedings, pp. 306-315, 2022, Springer, 978-3-031-32442-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Usva Rahim, Muhammad Faisal Siddiqui, Muhammad Awais Javed, Nazmus S. Nafi |
Architectural Implementation of AES based 5G Security Protocol on FPGA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNAC ![In: 32nd International Telecommunication Networks and Applications Conference, ITNAC 2022, Wellington, New Zealand, November 30 - Dec. 2, 2022, pp. 1-6, 2022, IEEE, 978-1-6654-7103-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Amund Askeland, Siemen Dhooghe, Svetla Nikova, Vincent Rijmen, Zhenda Zhang |
Guarding the First Order: The Rise of AES Maskings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CARDIS ![In: Smart Card Research and Advanced Applications - 21st International Conference, CARDIS 2022, Birmingham, UK, November 7-9, 2022, Revised Selected Papers, pp. 103-122, 2022, Springer, 978-3-031-25318-8. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Luan Cardoso dos Santos, François Gérard, Johann Großschädl, Lorenzo Spignoli |
Rivain-Prouff on Steroids: Faster and Stronger Masking of the AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CARDIS ![In: Smart Card Research and Advanced Applications - 21st International Conference, CARDIS 2022, Birmingham, UK, November 7-9, 2022, Revised Selected Papers, pp. 123-145, 2022, Springer, 978-3-031-25318-8. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Marek Bielik, Martin Jurecek, Olha Jurecková, Róbert Lórencz |
Yet Another Algebraic Cryptanalysis of Small Scale Variants of AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECRYPT ![In: Proceedings of the 19th International Conference on Security and Cryptography, SECRYPT 2022, Lisbon, Portugal, July 11-13, 2022., pp. 415-427, 2022, SCITEPRESS, 978-989-758-590-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Keshav Kumar, Vijay Singh, Gaurav Mishra, Bellam Ravindra Babu, Nandita Tripathi, Pramod Kumar |
Power-Efficient Secured Hardware Design of AES Algorithm on High Performance FPGA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IC3I ![In: 5th International Conference on Contemporary Computing and Informatics, IC3I 2022, Uttar Pradesh, India, December 14-16, 2022, pp. 1634-1637, 2022, IEEE, 979-8-3503-9826-7. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Sudharshan Swaminathan, Lukasz Chmielewski, Guilherme Perin, Stjepan Picek |
Deep Learning-Based Side-Channel Analysis Against AES Inner Rounds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS Workshops ![In: Applied Cryptography and Network Security Workshops - ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Rome, Italy, June 20-23, 2022, Proceedings, pp. 165-182, 2022, Springer, 978-3-031-16814-7. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Kaiyu Zhao, Fang Zhou 0001, Ning Wu, Jin Zhao, Fen Ge |
The Design of a Novel Hardware Trojan without Inactive Signal for AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCT ![In: 22nd IEEE International Conference on Communication Technology, ICCT 2022, Nanjing, China, November 11-14, 2022, pp. 1159-1163, 2022, IEEE, 978-1-6654-7067-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Prihatin Oktivasari, Maria Agustin, Rahmat Esa Mohammad Akbar, Asep Kurniawan, Ayu Rosyida Zain, Fachroni Arbi Murad |
Analysis of ECG Image File Encryption using ECDH and AES-GCM Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWBIS ![In: 7th International Workshop on Big Data and Information Security, IWBIS 2022, Depok, Indonesia, October 1-3, 2022, pp. 75-80, 2022, IEEE, 978-1-6654-8950-8. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Martin Brisfors, Michail Moraitis, Elena Dubrova |
Do Not Rely on Clock Randomization: A Side-Channel Attack on a Protected Hardware Implementation of AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPS ![In: Foundations and Practice of Security - 15th International Symposium, FPS 2022, Ottawa, ON, Canada, December 12-14, 2022, Revised Selected Papers, pp. 38-53, 2022, Springer, 978-3-031-30121-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Meizhi Wang, Sirish Oruganti, Shanshan Xie, Raghavan Kumar, Sanu Mathew, Jaydeep P. Kulkarni |
Fine-Grained Electromagnetic Side-Channel Analysis Resilient Secure AES Core with Stacked Voltage Domains and Spatio-temporally Randomized Circuit Blocks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESSCIRC ![In: 48th IEEE European Solid State Circuits Conference, ESSCIRC 2022, Milan, Italy, September 19-22, 2022, pp. 529-532, 2022, IEEE, 978-1-6654-8494-7. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Patrick Derbez, Marie Euler, Pierre-Alain Fouque, Phuong Hoa Nguyen |
Revisiting Related-Key Boomerang Attacks on AES Using Computer-Aided Tool. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT (3) ![In: Advances in Cryptology - ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part III, pp. 68-88, 2022, Springer, 978-3-031-22968-8. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Zhenyu Huang 0004, Siwei Sun |
Synthesizing Quantum Circuits of AES with Lower T-depth and Less Qubits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT (3) ![In: Advances in Cryptology - ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part III, pp. 614-644, 2022, Springer, 978-3-031-22968-8. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Sunanda Roy, Angelos Stavrou, Brian L. Mark, Kai Zeng 0001, Sai Manoj P. D., Khaled N. Khasawneh |
Characterization of AES Implementations on Microprocessor-based IoT Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNC ![In: IEEE Wireless Communications and Networking Conference, WCNC 2022, Austin, TX, USA, April 10-13, 2022, pp. 55-60, 2022, IEEE, 978-1-6654-4266-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Xiang Li, Russell Tessier, Daniel E. Holcomb |
Precise Fault Injection to Enable DFIA for Attacking AES in Remote FPGAs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCCM ![In: 30th IEEE Annual International Symposium on Field-Programmable Custom Computing Machines, FCCM 2022, New York City, NY, USA, May 15-18, 2022, pp. 1-5, 2022, IEEE, 978-1-6654-8332-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Anit Kumar Ghosal, Dipanwita Roychowdhury |
Strengthening the Security of AES Against Differential Fault Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Network and System Security - 16th International Conference, NSS 2022, Denarau Island, Fiji, December 9-12, 2022, Proceedings, pp. 727-744, 2022, Springer, 978-3-031-23019-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Raghavan Kumar, Vikram B. Suresh, Sachin Taneja, Mark A. Anders 0001, Steven Hsu, Amit Agarwal 0001, Vivek De, Sanu Mathew |
A 7Gbps SCA-Resistant Multiplicative-Masked AES Engine in Intel 4 CMOS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLSI Technology and Circuits ![In: IEEE Symposium on VLSI Technology and Circuits (VLSI Technology and Circuits 2022), Honolulu, HI, USA, June 12-17, 2022, pp. 138-139, 2022, IEEE, 978-1-6654-9772-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Archisman Ghosh, Dong-Hyun Seo, Debayan Das, Santosh Ghosh, Shreyas Sen |
A Digital Cascoded Signature Attenuation Countermeasure with Intelligent Malicious Voltage Drop Attack Detector for EM/Power SCA Resilient Parallel AES-256. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICC ![In: IEEE Custom Integrated Circuits Conference, CICC 2022, Newport Beach, CA, USA, April 24-27, 2022, pp. 1-2, 2022, IEEE, 978-1-6654-0756-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Zhanna Alimzhanova, Dauren Nazarbayev, Aizada Ayashova, Aktoty Kaliyeva |
Analysis of Ciphertext Behaviour Using the Example of the AES Block Cipher in ECB, CBC, OFB and CFB Modes of Operation, Using Multiple Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIIDS (2) ![In: Intelligent Information and Database Systems - 14th Asian Conference, ACIIDS 2022, Ho Chi Minh City, Vietnam, November 28-30, 2022, Proceedings, Part II, pp. 621-629, 2022, Springer, 978-3-031-21966-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Lorenzo Grassi 0001, Christian Rechberger |
Truncated Differential Properties of the Diagonal Set of Inputs for 5-Round AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 27th Australasian Conference, ACISP 2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings, pp. 24-45, 2022, Springer, 978-3-031-22300-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Jian Guo 0001, Ling Song, Haoyang Wang 0010 |
Key Structures: Improved Related-Key Boomerang Attack Against the Full AES-256. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 27th Australasian Conference, ACISP 2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings, pp. 3-23, 2022, Springer, 978-3-031-22300-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Raghavan Kumar, Vikram B. Suresh, Mark A. Anders 0001, Steven K. Hsu, Amit Agarwal 0001, Vivek K. De, Sanu K. Mathew |
An 8.3-to-18Gbps Reconfigurable SCA-Resistant/Dual-Core/Blind-Bulk AES Engine in Intel 4 CMOS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSCC ![In: IEEE International Solid-State Circuits Conference, ISSCC 2022, San Francisco, CA, USA, February 20-26, 2022, pp. 1-3, 2022, IEEE, 978-1-6654-2800-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Jingyao Zhang 0002, Hoda Naghibijouybari, Elaheh Sadredini |
Sealer: In-SRAM AES for High-Performance and Low-Overhead Memory Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISLPED ![In: ISLPED '22: ACM/IEEE International Symposium on Low Power Electronics and Design, Boston, MA, USA, August 1 - 3, 2022, pp. 14:1-14:6, 2022, ACM, 978-1-4503-9354-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Jae-Won Huh, Dong-Guk Han |
Differential Fault Attack on AES Using Maximum Four Bytes Faulty Ciphertexts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2022 - 25th International Conference, ICISC 2022, Seoul, South Korea, November 30 - December 2, 2022, Revised Selected Papers, pp. 235-245, 2022, Springer, 978-3-031-29370-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Jingbo Zhou, Elsayed Elgendy, Eslam Yahya Tawfik, Xinmiao Zhang |
Low-Complexity AES Architectures Resilient to Power Analysis Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS ![In: IEEE International Symposium on Circuits and Systems, ISCAS 2022, Austin, TX, USA, May 27 - June 1, 2022, pp. 165-169, 2022, IEEE, 978-1-6654-8485-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Jingjing Lan, Vishnu P. Nambiar, Ming Ming Wong, Fei Li, Yuan Gao 0011, Kevin Tshun Chuan Chai, Anh Tuan Do |
A 1800μm2, 953Gbps/W AES Accelerator for IoT Applications in 40nm CMOS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS ![In: IEEE International Symposium on Circuits and Systems, ISCAS 2022, Austin, TX, USA, May 27 - June 1, 2022, pp. 2433-2437, 2022, IEEE, 978-1-6654-8485-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Jun-Sheng Ng, Juncheng Chen, Nay Aung Kyaw, Ne Kyaw Zwa Lwin, Kwen-Siong Chong, Joseph Chang, Bah-Hwee Gwee |
An Asynchronous-Logic Masked Advanced Encryption Standard (AES) Accelerator and its Side-Channel Attack Evaluations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS ![In: IEEE International Symposium on Circuits and Systems, ISCAS 2022, Austin, TX, USA, May 27 - June 1, 2022, pp. 2256-2260, 2022, IEEE, 978-1-6654-8485-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Chengcheng Chang, Meiqin Wang, Ling Sun 0001, Wei Wang 0035 |
Improved Truncated Differential Distinguishers of AES with Concrete S-Box. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2022 - 23rd International Conference on Cryptology in India, Kolkata, India, December 11-14, 2022, Proceedings, pp. 422-445, 2022, Springer, 978-3-031-22911-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Runkun Li, Shichao Wang |
Experimental Study on the Validity of AES System in College Translation Teaching. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MLNLP ![In: Proceedings of the 5th International Conference on Machine Learning and Natural Language Processing, MLNLP 2022, Sanya, China, December 23-25, 2022., pp. 207-214, 2022, ACM, 978-1-4503-9906-7. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Yadi Zhong, Ujjwal Guin |
Fault-Injection Based Chosen-Plaintext Attacks on Multicycle AES Implementations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Great Lakes Symposium on VLSI ![In: GLSVLSI '22: Great Lakes Symposium on VLSI 2022, Irvine CA USA, June 6 - 8, 2022, pp. 443-448, 2022, ACM, 978-1-4503-9322-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Fan Yang, Kangxi Li, Yushuang Zhu, Ruilin Li |
Educational Technology in Language Assessment: Enhancing Writing Assessment Literacy Through the Pigai AES System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICFET ![In: ICFET 2022: The 8th International Conference on Frontiers of Educational Technologies, Yokohama, Japan, June 10 - 12, 2022, pp. 41-45, 2022, ACM, 978-1-4503-9640-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Yui Koyanagi, Tomoaki Ukezono |
An Extremely Light-Weight Countermeasure to Power Analysis Attack in Dedicated Circuit for AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISOCC ![In: 19th International SoC Design Conference, ISOCC 2022, Gangneung-si, Republic of Korea, October 19-22, 2022, pp. 85-86, 2022, IEEE, 978-1-6654-5971-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Tinku Adhikari, Malay Kule, Ajoy Kumar Khan |
An ECDH and AES Based Encryption Approach for Prevention of MiTM in SDN Southbound Communication Interface. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCNT ![In: 13th International Conference on Computing Communication and Networking Technologies, ICCCNT 2022, Kharagpur, India, October 3-5, 2022, pp. 1-5, 2022, IEEE, 978-1-6654-5262-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Jannis Bossert, Eik List, Stefan Lucks, Sebastian Schmitz |
Pholkos - Efficient Large-State Tweakable Block Ciphers from the AES Round Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2022 - Cryptographers' Track at the RSA Conference 2022, Virtual Event, March 1-2, 2022, Proceedings, pp. 511-536, 2022, Springer, 978-3-030-95311-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Victoria Sanz, Adrián Pousa, Marcelo R. Naiouf, Armando De Giusti |
Performance Analysis of AES on CPU-GPU Heterogeneous Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
JCC-BD&ET ![In: Cloud Computing, Big Data & Emerging Topics - 10th Conference, JCC-BD&ET 2022, La Plata, Argentina, June 28-30, 2022, Proceedings, pp. 31-42, 2022, Springer, 978-3-031-14598-8. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Ahmed Maache, Anouar Touati, Ayoub Ouali |
Implementation of an AES-based real-time Video Encryption/Decryption using FPGA/HPS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSD ![In: 19th International Multi-Conference on Systems, Signals & Devices, SSD 2022, Sétif, Algeria, May 6-10, 2022, pp. 709-713, 2022, IEEE, 978-1-6654-7108-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Xiaoyang Dong, Jian Guo 0001, Shun Li, Phuong Pham |
Triangulating Rebound Attack on AES-like Hashing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO (1) ![In: Advances in Cryptology - CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part I, pp. 94-124, 2022, Springer, 978-3-031-15801-8. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Zhenzhen Bao, Jian Guo 0001, Danping Shi, Yi Tu |
Superposition Meet-in-the-Middle Attacks: Updates on Fundamental Security of AES-like Hashing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO (1) ![In: Advances in Cryptology - CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part I, pp. 64-93, 2022, Springer, 978-3-031-15801-8. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Sultan Nurmukhamedov, Artur Pak, Rustem Takhanov, Zhenisbek Assylbekov |
Hardness of Learning AES Key (Short Paper). ![Search on Bibsonomy](Pics/bibsonomy.png) |
DP@AI*IA ![In: Proceedings of the Discussion Papers - 22nd International Conference of the Italian Association for Artificial Intelligence (AIxIA 2022 DP), Udine, Italy, November 28 - December 2, 2022., pp. 42-47, 2022, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
12 | Ke Li, Hua Li, Graeme Mund |
A 32-bit efficient subpipelined architecture for AES encryption and decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 18th International Conference on Computational Intelligence and Security, CIS 2022, Chengdu, China, December 16-18, 2022, pp. 391-393, 2022, IEEE, 979-8-3503-4627-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Sakshi Parikh, Raghav Jhanwar, Apoorv Singh |
Hybridization of AES and RSA Algorithm in File Encryption Using Parallel Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICACIS ![In: Advanced Communication and Intelligent Systems - First International Conference, ICACIS 2022, Virtual Event, October 20-21, 2022, Revised Selected Papers, pp. 281-291, 2022, Springer, 978-3-031-25087-3. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Phithak Thaenkaew, Bruno Quoitin, Ahmed Meddahi |
Evaluating the cost of beyond AES-128 LoRaWAN security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISNCC ![In: International Symposium on Networks, Computers and Communications, ISNCC 2022, Shenzhen, China, July 19-22, 2022, pp. 1-6, 2022, IEEE, 978-1-6654-8544-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
12 | Ajish S, K. S. Anil Kumar |
Secure mobile internet voting system using biometric authentication and wavelet based AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Secur. Appl. ![In: J. Inf. Secur. Appl. 61, pp. 102908, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
12 | Farah R. Shareef Taka |
Secure Communication by combined Diffe-Hellman key exchange Based AES Encryption and Arabic Text Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Hiding Multim. Signal Process. ![In: J. Inf. Hiding Multim. Signal Process. 12(4), pp. 186-198, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
12 | B. Muthulakshmi, M. Venkatesulu |
A novel security mechanism using AES cryptography approach in cloud computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Commun. Syst. ![In: Int. J. Commun. Syst. 34(6), 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
12 | Debayan Das, Josef Danial, Anupam Golder, Nirmoy Modak, Shovan Maity, Baibhab Chatterjee, Dong-Hyun Seo, Muya Chang, Avinash Varna 0001, Harish K. Krishnamurthy, Sanu Mathew, Santosh Ghosh, Arijit Raychowdhury, Shreyas Sen |
EM and Power SCA-Resilient AES-256 Through >350× Current-Domain Signature Attenuation and Local Lower Metal Routing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE J. Solid State Circuits ![In: IEEE J. Solid State Circuits 56(1), pp. 136-150, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
12 | Raghavan Kumar, Xiaosen Liu, Vikram B. Suresh, Harish K. Krishnamurthy, Sudhir Satpathy, Mark A. Anders 0001, Himanshu Kaul, Krishnan Ravichandran, Vivek De, Sanu K. Mathew |
A Time-/Frequency-Domain Side-Channel Attack Resistant AES-128 and RSA-4K Crypto-Processor in 14-nm CMOS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE J. Solid State Circuits ![In: IEEE J. Solid State Circuits 56(4), pp. 1141-1151, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
12 | Huanyu Wang, Elena Dubrova |
Tandem Deep Learning Side-Channel Attack on FPGA Implementation of AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SN Comput. Sci. ![In: SN Comput. Sci. 2(5), pp. 373, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
12 | Malik Qasaimeh, Raad S. Al-Qassas, Mohammad Ababneh |
Software Design and Experimental Evaluation of a Reduced AES for IoT Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Internet ![In: Future Internet 13(11), pp. 273, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
12 | Senthil Murugan Maniam, T. Sasilatha |
Area-efficient and high-speed hardware structure of hybrid cryptosystem (AES-RC4) for maximizing key lifetime using parallel subpipeline architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Concurr. Comput. Pract. Exp. ![In: Concurr. Comput. Pract. Exp. 33(3), 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
12 | Mahdi Esfahani, Hadi Soleimany, Mohammad Reza Aref |
Enhanced cache attack on AES applicable on ARM-based devices with new operating systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Networks ![In: Comput. Networks 198, pp. 108407, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
12 | YoungBeom Kim, Seog Chung Seo |
Efficient Implementation of AES and CTR_DRBG on 8-Bit AVR-Based Sensor Nodes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 9, pp. 30496-30510, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
12 | Soroor Ghandali, Samaneh Ghandali, Sara Tehranipoor |
Deep K-TSVM: A Novel Profiled Power Side-Channel Attack on AES-128. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 9, pp. 136448-136458, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
12 | Karim Shahbazi, Seok-Bum Ko |
Area-Efficient Nano-AES Implementation for Internet-of-Things Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Very Large Scale Integr. Syst. ![In: IEEE Trans. Very Large Scale Integr. Syst. 29(1), pp. 136-148, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
12 | Swapan Maiti, Dipanwita Roy Chowdhury |
Design of fault-resilient S-boxes for AES-like block ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptogr. Commun. ![In: Cryptogr. Commun. 13(1), pp. 71-100, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
12 | Simon Landry, Yanis Linge, Emmanuel Prouff |
Monomial evaluation of polynomial functions protected by threshold implementations - with an illustration on AES -. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptogr. Commun. ![In: Cryptogr. Commun. 13(4), pp. 543-572, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|