The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for AES with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1987-1999 (21) 2000 (45) 2001 (27) 2002 (52) 2003 (69) 2004 (94) 2005 (91) 2006 (119) 2007 (131) 2008 (147) 2009 (129) 2010 (106) 2011 (131) 2012 (92) 2013 (114) 2014 (132) 2015 (99) 2016 (104) 2017 (128) 2018 (110) 2019 (21)
Publication types (Num. hits)
article(606) book(1) incollection(10) inproceedings(1334) phdthesis(7) proceedings(4)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1145 occurrences of 417 keywords

Results
Found 1962 publication records. Showing 1962 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
162Shay Gueron Intel's New AES Instructions for Enhanced Performance and Security. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF new instructions set, computer architecture, Advanced Encryption Standard
156Jianyong Huang, Jennifer Seberry, Willy Susilo A Five-Round Algebraic Property of the Advanced Encryption Standard. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF A Five-Round Algebraic Property of the AES, Algorithm ?, Variants of Algorithm ?, ?AES, AES, Linear Equations
124Jongsung Kim, Seokhie Hong, Bart Preneel Related-Key Rectangle Attacks on Reduced AES-192 and AES-256. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Cryptanalysis, Block Ciphers, AES, Related-Key Rectangle Attack
123Tri Van Le, Rüdiger Sparr, Ralph Wernsdorf, Yvo Desmedt Complementation-Like and Cyclic Properties of AES Round Functions. Search on Bibsonomy AES Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF cyclic properties, AES, invariance, Rijndael, self-duality
118Yongzhuang Wei, YuPu Hu New related-key rectangle attacks on reduced AES-192 and AES-256. Search on Bibsonomy Science in China Series F: Information Sciences The full citation details ... 2009 DBLP  DOI  BibTeX  RDF block cipher, Advanced Encryption Standard, time complexity, related-key rectangle attack
105Liam Keliher Refined Analysis of Bounds Related to Linear and Differential Cryptanalysis for the AES. Search on Bibsonomy AES Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF SPN, MELP, MEDP, KMT2, KMT2-DC, AES, provable security, differential cryptanalysis, Rijndael, linear cryptanalysis
102Jean Monnerat, Serge Vaudenay On Some Weak Extensions of AES and BES. Search on Bibsonomy ICICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF AES, Rijndael, BES
102Johannes Blömer, Jean-Pierre Seifert Fault Based Cryptanalysis of the Advanced Encryption Standard (AES). Search on Bibsonomy Financial Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Secure Banking, Smart Cards, AES, Fault Attacks, Implementation Issues
102Nicolas Courtois The Inverse S-Box, Non-linear Polynomial Relations and Cryptanalysis of Block Ciphers. Search on Bibsonomy AES Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF interpolation attack on block ciphers, fractional transformations, homographic functions, generalised linear cryptanalysis, bi-linear cryptanalysis, Block ciphers, AES, Rijndael, Feistel ciphers, multivariate equations
94Norbert Pramstaller, Stefan Mangard, Sandra Dominikus, Johannes Wolkerstorfer Efficient AES Implementations on ASICs and FPGAs. Search on Bibsonomy AES Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF FPGA, Advanced Encryption Standard (AES), ASIC
93Sean Murphy, Matthew J. B. Robshaw Essential Algebraic Structure within the AES. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF (Finite) Galois Field, (Field) Conjugate, Multivariate Quadratic (MQ) Equations, Advanced Encryption Standard, AES, Rijndael, Algebraic Structure, BES
89Frederik Armknecht, Stefan Lucks Linearity of the AES Key Schedule. Search on Bibsonomy AES Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
89Christophe Giraud DFA on AES. Search on Bibsonomy AES Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
89Alex Biryukov The Boomerang Attack on 5 and 6-Round Reduced AES. Search on Bibsonomy AES Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
87Yohei Hori, Akashi Satoh, Hirofumi Sakane, Kenji Toda Bitstream encryption and authentication with AES-GCM in dynamically reconfigurable systems. Search on Bibsonomy FPL The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
87Daniel J. Bernstein The Poly1305-AES Message-Authentication Code. Search on Bibsonomy FSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
84Jun Zhang 0004, Jeffrey G. Andrews Distributed Antenna Systems with Randomness. Search on Bibsonomy IEEE Trans. Wireless Communications The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
83Peter Hellekalek, Stefan Wegenkittl Empirical evidence concerning AES. Search on Bibsonomy ACM Trans. Model. Comput. Simul. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF block ciphers, AES, diffusion, statistical tests, confusion
82Gang Zhou, Harald Michalik, László Hinsenkamp Improving Throughput of AES-GCM with Pipelined Karatsuba Multipliers on FPGAs. Search on Bibsonomy ARC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF AES-GCM, pipelined Karatsuba multiplier, FPGAs, finite field arithmetic
82Alireza Hodjat, Ingrid Verbauwhede Area-Throughput Trade-Offs for Fully Pipelined 30 to 70 Gbits/s AES Processors. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2006 DBLP  DOI  BibTeX  RDF crypto-processor, security, VLSI, cryptography, Advanced Encryption Standard (AES), ASIC, hardware architectures
80Joan Daemen, Mario Lamberger, Norbert Pramstaller, Vincent Rijmen, Frederik Vercauteren Computational aspects of the expected differential probability of 4-round AES and AES-like ciphers. Search on Bibsonomy Computing The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Mathematics Subject Classification (2000) 94A60, 11T71
80Hans Dobbertin, Lars R. Knudsen, Matthew J. B. Robshaw The Cryptanalysis of the AES - A Brief Survey. Search on Bibsonomy AES Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
80Marine Minier A Three Rounds Property of the AES. Search on Bibsonomy AES Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
79Chong Hee Kim, Jean-Jacques Quisquater New Differential Fault Analysis on AES Key Schedule: Two Faults Are Enough. Search on Bibsonomy CARDIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF AES key schedule, AES, Fault attack, DFA, Differential Fault Analysis
78Ryad Benadjila, Olivier Billet, Shay Gueron, Matthew J. B. Robshaw The Intel AES Instructions Set and the SHA-3 Candidates. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
78Xin-jie Zhao 0001, Tao Wang 0008, Dong Mi, Yuanyuan Zheng, Zhaoyang Lun Robust First Two Rounds Access Driven Cache Timing Attack on AES. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
78Ricardo Chaves, Georgi Kuzmanov, Stamatis Vassiliadis, Leonel Sousa Reconfigurable memory based AES co-processor. Search on Bibsonomy IPDPS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
75Nancy Samaan Achieving Self-management in a Distributed System of Autonomic BUT Social Entities. Search on Bibsonomy MACE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF interdependent utilities, Autonomic computing, utility functions
75Chih-Hsu Yen, Bing-Fei Wu Simple Error Detection Methods for Hardware Implementation of Advanced Encryption Standard. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2006 DBLP  DOI  BibTeX  RDF differential fault attacks, Advanced encryption standard, error control code, CRC
74Ewan Fleischmann, Michael Gorski, Stefan Lucks Attacking 9 and 10 Rounds of AES-256. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF related-key boomerang attack, block ciphers, AES, differential cryptanalysis
74Hüseyin Demirci, Ihsan Taskin, Mustafa Çoban, Adnan Baysal Improved Meet-in-the-Middle Attacks on AES. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cryptanalysis, AES, Rijndael, meet-in-the-middle attack
74Alex Biryukov, Dmitry Khovratovich, Ivica Nikolic Distinguisher and Related-Key Attack on the Full AES-256. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF chosen key distinguisher, Davies-Meyer, ideal cipher, AES, related-key attack
74Andrey Bogdanov Improved Side-Channel Collision Attacks on AES. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF generalized collisions, AES, side-channel attacks, random graphs, connected components, collision attacks
74Wentao Zhang, Wenling Wu, Dengguo Feng New Results on Impossible Differential Cryptanalysis of Reduced AES. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cryptanalysis, AES, impossible differentials
74Amir Moradi 0001, Mohammad T. Manzuri Shalmani, Mahmoud Salmasizadeh A Generalized Method of Differential Fault Attack Against AES Cryptosystem. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cryptanalysis, Smart Card, AES, Side Channel Attacks, Fault Attacks
74Joseph Bonneau, Ilya Mironov Cache-Collision Timing Attacks Against AES. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cache, cryptanalysis, AES, side-channel attack, timing attack
74Stefan Mangard, Kai Schramm Pinpointing the Side-Channel Leakage of Masked AES Hardware Implementations. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Zero-Offset DPA, Zero-Input DPA, Delay Chains, AES, DPA, Masking, Glitches
74Olivier Billet, Henri Gilbert, Charaf Ech-Chatbi Cryptanalysis of a White Box AES Implementation. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF white box, implementation, block ciphers, AES, tamper resistance, software piracy
74Dino Oliva, Rainer Buchty, Nevin Heintze AES and the cryptonite crypto processor. Search on Bibsonomy CASES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF round key generation, architecture, cryptography, AES, processor, high-speed, software implementation, high-bandwidth
74Stefan Mangard A Simple Power-Analysis (SPA) Attack on Implementations of the AES Key Expansion. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Key Expansion, Smart Cards, AES, Power Analysis, SPA, Key Scheduling
74Nicolas Courtois General Principles of Algebraic Attacks and New Design Criteria for Cipher Components. Search on Bibsonomy AES Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF polynomial relations, design of cryptographic primitives, generalised linear cryptanalysis, multivariate public key encryption and signature schemes, Quartz, combiners with memory, elimination methods, Gröbner bases, Boolean functions, stream ciphers, block ciphers, AES, finite fields, algebraic attacks, Rijndael, Serpent, HFE, Sflash, multivariate equations
71Mun-Kyu Lee, Jung Ki Min, Seok Hun Kang, Sang-Hwa Chung, Howon Kim, Dong Kyue Kim Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection Protocols. Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF electronic seal, RFID, AES, message authentication code, pseudorandom function
71Elena Trichina, Tymur Korkishko, Kyung-Hee Lee Small Size, Low Power, Side Channel-Immune AES Coprocessor: Design and Synthesis Results. Search on Bibsonomy AES Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
68Shee-Yau Wu, Shih-Chuan Lu, Chi-Sung Laih Design of AES Based on Dual Cipher and Composite Field. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
68Carlos Cid Some Algebraic Aspects of the Advanced Encryption Standard. Search on Bibsonomy AES Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
68Håvard Raddum More Dual Rijndaels. Search on Bibsonomy AES Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
68Alex Biryukov, Dmitry Khovratovich Related-Key Cryptanalysis of the Full AES-192 and AES-256. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF AES, related-key attack, boomerang attack
65Jie Chen, YuPu Hu, Yueyu Zhang Impossible differential cryptanalysis of Advanced Encryption Standard. Search on Bibsonomy Science in China Series F: Information Sciences The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cryptanalysis, block cipher, advanced encryption standard, impossible differential cryptanalysis
65Flavius Opritoiu, Mircea Vladutiu, Lucian Prodan, Mihai Udrescu A high-speed AES architecture implementation. Search on Bibsonomy Conf. Computing Frontiers The full citation details ... 2010 DBLP  DOI  BibTeX  RDF cryptochip, optimization, fpga, hardware, aes
65Jiqiang Lu, Orr Dunkelman, Nathan Keller, Jongsung Kim New Impossible Differential Attacks on AES. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF AES, Impossible differential cryptanalysis
65Michael Gorski, Stefan Lucks New Related-Key Boomerang Attacks on AES. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF related-key boomerang attack, block ciphers, AES, differential cryptanalysis
65Hüseyin Demirci, Ali Aydin Selçuk A Meet-in-the-Middle Attack on 8-Round AES. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF meet-in-the-middle cryptanalysis, square attack, AES, Rijndael
65Jörn-Marc Schmidt, Chong Hee Kim A Probing Attack on AES. Search on Bibsonomy WISA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Probing Attack, Smart Card, AES
65Adam J. Elbirt Fast and Efficient Implementation of AES via Instruction Set Extensions. Search on Bibsonomy AINA Workshops (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cryptography, block cipher, AES, Galois Field
65Wentao Zhang, Lei Zhang 0012, Wenling Wu, Dengguo Feng Related-Key Differential-Linear Attacks on Reduced AES-192. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF related-key, differential-linear attack, cryptanalysis, AES
65Wentao Zhang, Wenling Wu, Lei Zhang 0012, Dengguo Feng Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF related-key differentials, cryptanalysis, AES, impossible differentials
65Eli Biham, Orr Dunkelman, Nathan Keller Related-Key Impossible Differential Attacks on 8-Round AES-192. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF related-key differentials, AES, impossible differentials
65Kai Schramm, Christof Paar Higher Order Masking of the AES. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Higher Order DPA, Masking Countermeasure, AES
65Kazuhiko Minematsu, Yukiyasu Tsunoo Provably Secure MACs from Differentially-Uniform Permutations and AES-Based Implementations. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Differentially-uniform permutation, MAC, Block cipher, AES
65Jakob Jonsson, Matthew J. B. Robshaw Securing RSA-KEM via the AES. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF RSA-KEM, key derivation function, AES
65Siddika Berna Örs, Frank K. Gürkaynak, Elisabeth Oswald, Bart Preneel Power-Analysis Attack on an ASIC AES implementation. Search on Bibsonomy ITCC (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF AES, power analysis attack
65Kai Schramm, Gregor Leander, Patrick Felke, Christof Paar A Collision-Attack on AES: Combining Side Channel- and Differential-Attack. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF internal collisions, AES, side channel attacks, birthday paradox
65Gilles Piret, Jean-Jacques Quisquater A Differential Fault Attack Technique against SPN Structures, with Application to the AES and KHAZAD. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Block Ciphers, AES, Side-channel Attacks, Fault Attacks
65Chien-Ning Chen, Sung-Ming Yen Differential Fault Analysis on AES Key Schedule and Some Coutnermeasures. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Differential fault analysis (DFA), Smart cards, AES, Rijndael, Physical cryptanalysis
64Kimmo U. Järvinen, Matti Tommiska, Jorma Skyttä A fully pipelined memoryless 17.8 Gbps AES-128 encryptor. Search on Bibsonomy FPGA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF FPGA, pipelining, advanced encryption standard (AES)
64Christopher Caltagirone, Kasi Anantha High throughput, parallelized 128-bit AES encryption in a resource-limited FPGA. Search on Bibsonomy SPAA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF 128-bit AES, optimization, FPGA, parallelization, hardware, high-throughput
62Mitsuru Matsui, Junko Nakajima On the Power of Bitslice Implementation on Intel Core2 Processor. Search on Bibsonomy CHES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Fast Software Encryption, Bitslice, KASUMI, Core2, AES
62Ilia Toli, Alberto Zanoni An Algebraic Interpretation of AES-128. Search on Bibsonomy AES Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
59Akashi Satoh, Takeshi Sugawara, Naofumi Homma, Takafumi Aoki High-Performance Concurrent Error Detection Scheme for AES Hardware. Search on Bibsonomy CHES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
59Jingmei Liu, Baodian Wei, Xiangguo Cheng, Xinmei Wang An AES S-Box to Increase Complexity and Cryptographic Analysis. Search on Bibsonomy AINA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
59Vitalij Ocheretnij, G. Kouznetsov, Ramesh Karri, Michael Gössel On-Line Error Detection and BIST for the AES Encryption Algorithm with Different S-Box Implementations. Search on Bibsonomy IOLTS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
59Chih-Chung Lu, Shau-Yin Tseng Integrated Design of AES (Advanced Encryption Standard) Encrypter and Decrypter. Search on Bibsonomy ASAP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
59Lars R. Knudsen Advanced Encryption Standard (AES) - An Update. Search on Bibsonomy IMA Int. Conf. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
56Goce Jakimoski, K. P. Subbalakshmi On Efficient Message Authentication Via Block Cipher Design Techniques. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Wegman-Carter construction, maximum differential probability, block ciphers, Message authentication, universal hash functions
56Guido Bertoni, A. Bircan, Luca Breveglieri, Pasqualina Fragneto, Marco Macchetti, Vittorio Zaccaria About the performances of the Advanced Encryption Standard in embedded systems with cache memory. Search on Bibsonomy ISCAS (5) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
55Mike Hamburg Accelerating AES with Vector Permute Instructions. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SSSE3, vector permute, cache-timing attacks, AES, fast implementations, composite fields, AltiVec
55Alex Tsow An Improved Recovery Algorithm for Decayed AES Key Schedule Images. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF anti-tamper, decayed memory, cold-boot attack, AES, digital forensics, key schedule
55Monjur Alam, Santosh Ghosh, Dipanwita Roy Chowdhury, Indranil Sengupta 0001 Single Chip Encryptor/Decryptor Core Implementation of AES Algorithm. Search on Bibsonomy VLSI Design The full citation details ... 2008 DBLP  DOI  BibTeX  RDF AES, Reconfigurable Architecture, S- box, Rijndael, Composite fields
55Shammi Didla, Aaron Ault, Saurabh Bagchi Optimizing AES for embedded devices and wireless sensor networks. Search on Bibsonomy TRIDENTCOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF CC2420, Zigbee security, embedded optimizations, secure sensor networks, encryption, AES, MSP430
55Svetla Nikova, Vincent Rijmen, Martin Schläffer Using Normal Bases for Compact Hardware Implementations of the AES S-Box. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF AES, hardware implementation, S-box, normal basis
55Babak Zakeri, Mahmoud Salmasizadeh, Amir Moradi 0001, Mahmoud Tabandeh, Mohammad T. Manzuri Shalmani Compact and Secure Design of Masked AES S-Box. Search on Bibsonomy ICICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Composite field arithmetic, AES, Side-Channel Attack, Masking
55Christoph Herbst, Elisabeth Oswald, Stefan Mangard An AES Smart Card Implementation Resistant to Power Analysis Attacks. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF DPA resistance, smart card, AES
55Johannes A. Buchmann, Andrei Pyshkin, Ralf-Philipp Weinmann A Zero-Dimensional Gröbner Basis for AES-128. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Gröbner bases, block ciphers, AES, Rijndael
55Guido Bertoni, Vittorio Zaccaria, Luca Breveglieri, Matteo Monchiero, Gianluca Palermo AES Power Attack Based on Induced Cache Miss and Countermeasure. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Cache, Block Cipher, AES, Power Analysis, Cache Miss
55Jovan Dj. Golic, Christophe Tymen Multiplicative Masking and Power Analysis of AES. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF multiplicative masking, AES, differential power analysis, countermeasures
54Stefan Tillich, Martin Feldhofer, Thomas Popp, Johann Großschädl Area, Delay, and Power Characteristics of Standard-Cell Implementations of the AES S-Box. Search on Bibsonomy Signal Processing Systems The full citation details ... 2008 DBLP  DOI  BibTeX  RDF substitution box (S-box), inversion in the finite field GF($28$), standard cell implementation, Advanced Encryption Standard (AES), power consumption, silicon area, critical path delay
54Zhenglin Liu, Xu Guo, Yi-cheng Chen, Yu Han, Xuecheng Zou On the Ability of AES S-Boxes to Secure Against Correlation Power Analysis. Search on Bibsonomy ISPEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF correlation power analysis (CPA), Advanced Encryption Standard (AES), hamming distance, correlation coefficient
54Hui Qin, Tsutomu Sasao, Yukihiro Iguchi An FPGA design of AES encryption circuit with 128-bit keys. Search on Bibsonomy ACM Great Lakes Symposium on VLSI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF AES encryption, FPGA, pipeline
54Martin Feldhofer, Sandra Dominikus, Johannes Wolkerstorfer Strong Authentication for RFID Systems Using the AES Algorithm. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF symmetric challenge-response, Radio frequency identification (RFID), low-power design, Advanced Encryption Standard (AES)
53Chu-Wee Lim, Khoongming Khoo An Analysis of XSL Applied to BES. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF XSL algorithm, AES, linearisation, BES
53Carlos Cid, Gaëtan Leurent An Analysis of the XSL Algorithm. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF XSL algorithm, T? method, AES, Linearization
53Guido Bertoni, Luca Breveglieri, Israel Koren, Paolo Maistri, Vincenzo Piuri Error Analysis and Detection Procedures for a Hardware Implementation of the Advanced Encryption Standard. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2003 DBLP  DOI  BibTeX  RDF parity codes, fault tolerance, fault detection, Advanced Encryption Standard, AES
52Jude Angelo Ambrose, Sri Parameswaran, Aleksandar Ignjatovic MUTE-AES: a multiprocessor architecture to prevent power analysis based side channel attack of the AES algorithm. Search on Bibsonomy ICCAD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
50Wen-Ai Jackson, S. Murphy Projective aspects of the AES inversion. Search on Bibsonomy Des. Codes Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF 51E15, AMS Classifications 94A60
50Junko Takahashi, Toshinori Fukunaga, Kimihiro Yamakoshi DFA Mechanism on the AES Key Schedule. Search on Bibsonomy FDTC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
50Abdul Samiah, Arshad Aziz, Nassar Ikram An Efficient Software Implementation of AES-CCM for IEEE 802.11i Wireless St. Search on Bibsonomy COMPSAC (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
50Mooseop Kim, Jaecheol Ryou, YongJe Choi, Sungik Jun Low Power AES Hardware Architecture for Radio Frequency Identification. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
50Dyi-Rong Duh, Tsung-Chi Lin, Chi-Ho Tung, Shin-Jie Chan An Implementation of AES Algorithm with the Multiple Spaces Random Key Pre-Distribution Scheme on MOTE-KIT 5040. Search on Bibsonomy SUTC (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
50Chih-Pin Su, Chia-Lung Horng, Chih-Tsun Huang, Cheng-Wen Wu A configurable AES processor for enhanced security. Search on Bibsonomy ASP-DAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
50Valeri F. Tomashau, Tom Kean Validation of an Advanced Encryption Standard (AES) IP Core. Search on Bibsonomy FCCM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 1962 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license