The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase block-ciphers (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1985-1992 (17) 1993-1996 (20) 1997-1998 (36) 1999-2000 (40) 2001 (25) 2002 (25) 2003 (36) 2004 (47) 2005 (38) 2006 (52) 2007 (47) 2008 (57) 2009 (50) 2010 (25) 2011 (18) 2012 (41) 2013 (40) 2014 (38) 2015 (47) 2016 (37) 2017 (54) 2018 (47) 2019 (42) 2020 (62) 2021 (34) 2022 (42) 2023 (46) 2024 (7)
Publication types (Num. hits)
article(442) book(1) incollection(13) inproceedings(578) phdthesis(36)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 634 occurrences of 233 keywords

Results
Found 1070 publication records. Showing 1070 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
18Lenka Fibíková Provable secure scalable block ciphers. (PDF / PS) Search on Bibsonomy 2003   RDF
18Ramesh Karri, Kaijie Wu 0001, Piyush Mishra, Yongkook Kim Concurrent error detection schemes for fault-based side-channel cryptanalysis of symmetric block ciphers. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
18Hongjun Wu 0001, Feng Bao 0001, Robert H. Deng Cryptanalysis of Some Hash Functions Based on Block Ciphers and Codes. Search on Bibsonomy Informatica (Slovenia) The full citation details ... 2002 DBLP  BibTeX  RDF
18Nicolas T. Courtois, Josef Pieprzyk Cryptanalysis of Block Ciphers with Overdefined Systems of Equations. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2002 DBLP  BibTeX  RDF
18Yukio Mitsuyama, Zaldy Andales, Takao Onoye, Isao Shirakawa Burst mode: a new acceleration mode for 128-bit block ciphers. Search on Bibsonomy CICC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
18Panayotis E. Nastou, Yannis C. Stamatiou Enhancing the Security of Block Ciphers with the Aid of Parallel Substitution Box Construction. Search on Bibsonomy ICDCS Workshops The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
18John O. Pliam A polynomial-time universal security amplifier in the class of block ciphers. Search on Bibsonomy Commun. Inf. Syst. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
18Thomas Jakobsen, Lars R. Knudsen Attacks on Block Ciphers of Low Algebraic Degree. Search on Bibsonomy J. Cryptol. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
18Joan Daemen, Lars R. Knudsen, Vincent Rijmen Linear Frameworks for Block Ciphers. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2001 DBLP  BibTeX  RDF
18Jorge Nakahara Jr., Paulo S. L. M. Barreto, Bart Preneel, Joos Vandewalle, Hae Y. Kim SQUARE Attacks on Reduced-Round PES and IDEA Block Ciphers. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2001 DBLP  BibTeX  RDF
18Deukjo Hong, Jaechul Sung, Seokhie Hong, Wonil Lee, Sangjin Lee 0002, Jongin Lim 0001, Okyeon Yi Known-IV Attacks on Triple Modes of Operation of Block Ciphers. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF mode of operation for DES, Block cipher, Triple DES
18Ramesh Karri, Kaijie Wu 0001, Piyush Mishra, Yongkook Kim Concurrent Error Detection of Fault-Based Side-Channel Cryptanalysis of 128-Bit Symmetric Block Ciphers. Search on Bibsonomy DAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
18Valér Canda Scalable symmetric block ciphers based on group bases. (PDF / PS) Search on Bibsonomy 2001   RDF
18Alexander A. Moldovyan Fast block ciphers based on controlled permutations. Search on Bibsonomy Comput. Sci. J. Moldova The full citation details ... 2000 DBLP  BibTeX  RDF
18John O. Pliam A Polynomial-Time Universal Security Amplifier in the Class of Block Ciphers. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
18Makoto Sugita, Kazukuni Kobara, Kazuhiro Uehara, Shuji Kubota, Hideki Imai Relationships among Differential, Truncated Differential, Impossible Differential Cryptanalyses against Word-Oriented Block Ciphers like RIJNDAEL, E2. Search on Bibsonomy AES Candidate Conference The full citation details ... 2000 DBLP  BibTeX  RDF
18Toro Inoue, Kouichi Sakurai Making Hash Functions From Block Ciphers Secure and Efficient by Using Convolutional Codes. Search on Bibsonomy Public Key Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
18Ernest F. Brickell, Giovanni Di Crescenzo, Yair Frankel Sharing Block Ciphers. Search on Bibsonomy ACISP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
18Santiago Fernández-Gomez, Juan J. Rodríguez-Andina, Enrique Mandado Concurrent error detection in block ciphers Search on Bibsonomy ITC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
18Taraneh Eghlidos On the security of DES and DES-like block ciphers against differential cryptanalysis. Search on Bibsonomy 2000   RDF
18A. Schubert, Walter Anheier Efficient VLSI implementation of modern symmetric block ciphers. Search on Bibsonomy ICECS The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
18Kenneth G. Paterson Imprimitive Permutation Groups and Trapdoors in Iterated Block Ciphers. Search on Bibsonomy FSE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
18Vincent Rijmen, Joan Daemen Efficient Block Ciphers for Smartcards. Search on Bibsonomy Smartcard The full citation details ... 1999 DBLP  BibTeX  RDF
18Richard J. de Moliner On the statistical testing of block ciphers. Search on Bibsonomy 1999   RDF
18Rüdiger Weis, Stefan Lucks The Performance of Modern Block Ciphers in Java. Search on Bibsonomy CARDIS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
18Mihir Bellare, Ted Krovetz, Phillip Rogaway Luby-Rackoff Backwards: Increasing Security by Making Block Ciphers Non-invertible. Search on Bibsonomy EUROCRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
18Helen Gustafson, Ed Dawson, Jovan Dj. Golic Automated statistical methods for measuring the strength of block ciphers. Search on Bibsonomy Stat. Comput. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
18Lars R. Knudsen Block Ciphers - A Survey. Search on Bibsonomy State of the Art in Applied Cryptography The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
18Bart Preneel Hash Functions and MAC Algorithms Based on Block Ciphers. Search on Bibsonomy IMACC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
18Takeshi Shimoyama, Seiichi Amada, Shiho Moriai Improved fast software implementation of block ciphers. Search on Bibsonomy ICICS The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
18Mitsuru Matsui New Structure of Block Ciphers with Provable Security against Differential and Linear Cryptanalysis. Search on Bibsonomy FSE The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
18Ross J. Anderson, Eli Biham Two Practical and Provably Secure Block Ciphers: BEARS and LION. Search on Bibsonomy FSE The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
18Carlo Harpes Cryptanalysis of iterated block ciphers. Search on Bibsonomy 1996   RDF
18Michael Roe Performance of Block Ciphers and Hash Functions - One Year Later. Search on Bibsonomy FSE The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
18Vincent Rijmen, Bart Preneel Improved Characteristics for Differential Cryptanalysis of Hash Functions Based on Block Ciphers. Search on Bibsonomy FSE The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
18Kaisa Nyberg Linear Approximation of Block Ciphers. Search on Bibsonomy EUROCRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
18Caroline Allinson, Helen Bergen, Ed Dawson Message collision in block ciphers with message authentication. Search on Bibsonomy Comput. Secur. The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
18Bart Preneel, René Govaerts, Joos Vandewalle Differential Cryptanalysis of Hash Functions Based on Block Ciphers. Search on Bibsonomy CCS The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
18Walter Hohl, Xuejia Lai, Thomas Meier 0001, Christian Waldvogel Security of Iterated Hash Functions Based on Block Ciphers. Search on Bibsonomy CRYPTO The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
18Xuejia Lai On the design and security of block ciphers. Search on Bibsonomy 1992   RDF
18Richard Cleve Methodologies for designing block ciphers and cryptographic protocols. Search on Bibsonomy 1989   RDF
18David Chaum, Jan-Hendrik Evertse Crytanalysis of DES with a Reduced Number of Rounds: Sequences of Linear Factors in Block Ciphers. Search on Bibsonomy CRYPTO The full citation details ... 1985 DBLP  DOI  BibTeX  RDF
17Zheng Gong, Xuejia Lai, Kefei Chen A synthetic indifferentiability analysis of some block-cipher-based hash functions. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF AMS Classifications 68W40, 68Q25
17Louis Granboulan, Éric Levieil, Gilles Piret Pseudorandom Permutation Families over Abelian Groups. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF arbitrary domain, differential and linear cryptanalysis, block cipher
17Mun-Kyu Lee, Jung Ki Min, Seok Hun Kang, Sang-Hwa Chung, Howon Kim 0001, Dong Kyue Kim Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection Protocols. Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF electronic seal, RFID, AES, message authentication code, pseudorandom function
17Kazuhiko Minematsu, Yukiyasu Tsunoo Expanding Weak PRF with Small Key Size. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Yuliang Zheng 0001, Yongge Wang Efficient and provably secure ciphers for storage device block level encryption. Search on Bibsonomy StorageSS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF storage device encryption, hash function, symmetric cipher
17François-Xavier Standaert, Gilles Piret, Gaël Rouvroy, Jean-Jacques Quisquater, Jean-Didier Legat ICEBERG : An Involutional Cipher Efficient for Block Encryption in Reconfigurable Hardware. Search on Bibsonomy FSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF block cipher design, side-channel resistance, reconfigurable hardware, efficient implementations
17Ueli M. Maurer Indistinguishability of Random Systems. Search on Bibsonomy EUROCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF random systems, quasi-randomness, Indistinguishability, pseudo-random functions, CBC-MAC, pseudo-random permutations
17Julio César Hernández Castro, José María Sierra, Arturo Ribagorda, Benjamín Ramos, J. Carlos Mex-Perera Distinguishing TEA from a Random Permutation: Reduced Round Versions of TEA Do Not Have the SAC or Do Not Generate Random Numbers. Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
17A. Schubert, Walter Anheier On Random Pattern Testability of Cryptographic VLSI Cores. Search on Bibsonomy J. Electron. Test. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF testing of cores, test-ready intellectual property, built-in self-test, pseudorandom testing
17Kazumaro Aoki, Tetsuya Ichikawa, Masayuki Kanda, Mitsuru Matsui, Shiho Moriai, Junko Nakajima, Toshio Tokita Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
17Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle Linear Cryptanalysis of Reduced-Round Versions of the SAFER Block Cipher Family. Search on Bibsonomy FSE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
17Paul Crowley Mercy: A Fast Large Block Cipher for Disk Sector Encryption. Search on Bibsonomy FSE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF disk sector, large block, avalanche, Mercy home page: http://www.cluefactory.org.uk/paul/mercy/ http://www.cluefactory.org.uk/paul/mercy/, state machine, Feistel cipher
17Dong Hyeon Cheon, Seokhie Hong, Sangjin Lee 0002, Sung Jae Lee, Kyung Hwan Park, Seonhee Yoon Difference Distribution Attack on DONUT and Improved DONUT. Search on Bibsonomy ICISC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF DONUT, Differential Cryptanalysis(DC), Linear Cryptanalysis(LC), Difference Distribution Attack(DDA), Decorrelation
17Anand Desai The Security of All-or-Nothing Encryption: Protecting against Exhaustive Key Search. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
17Adam L. Young, Moti Yung Monkey: Black-Box Symmetric Ciphers Designed for MONopolizing KEYs. Search on Bibsonomy FSE The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
14Dmitry Khovratovich Cryptanalysis of Hash Functions with Structures. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF truncated differentials, Grindahl, Fugue, cryptanalysis, hash functions, structures, SHA-3
14Anja Lehmann, Stefano Tessaro A Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix Approach Practical. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Keting Jia, Xiaoyun Wang 0001, Zheng Yuan, Guangwu Xu Distinguishing and Second-Preimage Attacks on CBC-Like MACs. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF CBC, MAC, Distinguishing attack, Second preimage attack
14Debrup Chakraborty, Palash Sarkar 0001 HCH: A New Tweakable Enciphering Scheme Using the Hash-Counter-Hash Approach. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Christophe De Cannière, Bart Preneel Trivium. Search on Bibsonomy The eSTREAM Finalists The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Like Chen, Runtong Zhang A Key-dependent Cipher DSDP. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Block cipher algorithm, DSDP structure
14Yedidya Hilewitz, Yiqun Lisa Yin, Ruby B. Lee Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical Permutation. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Olivier Billet, Matthew J. B. Robshaw, Yannick Seurin, Yiqun Lisa Yin Looking Back at a New Hash Function. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Takeshi Sugawara 0001, Naofumi Homma, Takafumi Aoki, Akashi Satoh High-performance ASIC implementations of the 128-bit block cipher CLEFIA. Search on Bibsonomy ISCAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Jiya Jiang, Tong Liu, Guifen Zhao A Two-Way Authentication Based on One-Time SMS4 Algorithm and Combined Symmetric Key. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Wei Li 0131, Zibin Dai, Tao Chen 0047, Tao Meng, Xuan S. Yang Design and Implementation of a High-Speed Reconfigurable Modular Arithmetic Unit. Search on Bibsonomy APPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Eli Biham, Orr Dunkelman, Nathan Keller A New Attack on 6-Round IDEA. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Wil Michiels, Paul Gorissen Mechanism for software tamper resistance: an application of white-box cryptography. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2007 DBLP  DOI  BibTeX  RDF software tamper resistance, white-box cryptography, software protection
14Chris J. Mitchell Cryptanalysis of the EPBC Authenticated Encryption Mode. Search on Bibsonomy IMACC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Helena Handschuh, Bart Preneel Blind Differential Cryptanalysis for Enhanced Power Attacks. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF combined cryptanalysis, blind cryptanalysis, side channel attacks, power analysis, differential cryptanalysis, Hamming weights
14Eli Biham, Orr Dunkelman, Nathan Keller New Cryptanalytic Results on IDEA. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Christophe De Cannière Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Jong Sou Park, Sung-Hwan Kim, Dong Seong Kim 0001 A Hardware Implementation of Lightweight Block Cipher for Ubiquitous Computing Security. Search on Bibsonomy KES (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Jiqiang Lu, Changhoon Lee, Jongsung Kim Related-Key Attacks on the Full-Round Cobra-F64a and Cobra-F64b. Search on Bibsonomy SCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cobra-F64a, Cobra-F64b, Block cipher, Differential cryptanalysis, Related-key attacks, Data-dependent permutation
14Jianjun Duan, Joe Hurd, Guodong Li, Scott Owens, Konrad Slind, Junxing Zhang Functional Correctness Proofs of Encryption Algorithms. Search on Bibsonomy LPAR The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Katsuyuki Okeya, Tetsu Iwata Side Channel Attacks on Message Authentication Codes. Search on Bibsonomy ESAS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Selective Forgery, MACs, Side Channel Attacks, DPA, SPA
14Chih-Pin Su, Chia-Lung Horng, Chih-Tsun Huang, Cheng-Wen Wu A configurable AES processor for enhanced security. Search on Bibsonomy ASP-DAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14François-Xavier Standaert, Gilles Piret, Gaël Rouvroy, Jean-Jacques Quisquater FPGA Implementations of the ICEBERG Block Cipher. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Seokhie Hong, Deukjo Hong, Youngdai Ko, Donghoon Chang, Wonil Lee, Sangjin Lee 0002 Differential Cryptanalysis of TEA and XTEA. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF TEA, XTEA, truncated differential cryptanalysis, Block cipher, differential cryptanalysis
14Dukjae Moon, Kyungdeok Hwang, Wonil Lee, Sangjin Lee 0002, Jongin Lim 0001 Impossible Differential Cryptanalysis of Reduced Round XTEA and TEA. Search on Bibsonomy FSE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
14Ivan Damgård, Jesper Buus Nielsen Expanding Pseudorandom Functions; or: From Known-Plaintext Security to Chosen-Plaintext Security. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
14Kris Gaj, Pawel Chodowiec Fast Implementation and Fair Comparison of the Final Candidates for Advanced Encryption Standard Using Field Programmable Gate Arrays. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
14Amr M. Youssef Cryptanalysis of the "Augmented Family of Cryptographic Parity Circuits" Proposed at ISW'97. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF augmented parity circuits, cryptanalysis, Block cipher
14Serge Vaudenay Resistance Against General Iterated Attacks. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
14Ronald L. Rivest All-or-Nothing Encryption and the Package Transform. Search on Bibsonomy FSE The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
14Mitsuru Matsui New Block Encryption Algorithm MISTY. Search on Bibsonomy FSE The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
14Carlo Harpes, James L. Massey Partitioning Cryptanalysis. Search on Bibsonomy FSE The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
14Kenji Koyama, Routo Terada Nonlinear Parity Circuits and their Cryptographic Applications. Search on Bibsonomy CRYPTO The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
11Siva Anantharaman, Hai Lin 0005, Christopher Lynch, Paliath Narendran, Michaël Rusinowitch Cap unification: application to protocol security modulo homomorphic encryption. Search on Bibsonomy AsiaCCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF secrecy analysis, protocol, rewriting, unification
11Rosario Gennaro, Shai Halevi More on Key Wrapping. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Deterministic Encryption, Key Wrapping, Modes of Operation, Symmetric Encryption
11Alex Biryukov, Dmitry Khovratovich Related-Key Cryptanalysis of the Full AES-192 and AES-256. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF AES, related-key attack, boomerang attack
11Mathieu Renauld, François-Xavier Standaert, Nicolas Veyrat-Charvillon Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
11Johan Håstad, Mats Näslund Practical Construction and Analysis of Pseudo-Randomness Primitives. Search on Bibsonomy J. Cryptol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Hard core function, One-way function, Pseudo random generator, Exact security
11Sihem Mesnager Improving the Lower Bound on the Higher Order Nonlinearity of Boolean Functions With Prescribed Algebraic Immunity. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Claude Carlet Recursive Lower Bounds on the Nonlinearity Profile of Boolean Functions and Their Applications. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Stefan Tillich, Martin Feldhofer, Thomas Popp, Johann Großschädl Area, Delay, and Power Characteristics of Standard-Cell Implementations of the AES S-Box. Search on Bibsonomy J. Signal Process. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF substitution box (S-box), inversion in the finite field GF($28$), standard cell implementation, Advanced Encryption Standard (AES), power consumption, silicon area, critical path delay
11Carsten Rolfes, Axel Poschmann, Gregor Leander, Christof Paar Ultra-Lightweight Implementations for Smart Devices - Security for 1000 Gate Equivalents. Search on Bibsonomy CARDIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Ascensión Hernández Encinas, Ángel Martín del Rey, José Luis Pérez Iglesias, Gerardo Rodríguez Sánchez, Araceli Queiruga Dios Cryptographic Properties of Second-Order Memory Elementary Cellular Automata. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cryptography, Cellular automata, memory, differential cryptanalysis
Displaying result #901 - #1000 of 1070 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license