|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1145 occurrences of 417 keywords
|
|
|
Results
Found 2665 publication records. Showing 2665 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
149 | Shay Gueron |
Intel's New AES Instructions for Enhanced Performance and Security. |
FSE |
2009 |
DBLP DOI BibTeX RDF |
new instructions set, computer architecture, Advanced Encryption Standard |
146 | Jianyong Huang, Jennifer Seberry, Willy Susilo |
A Five-Round Algebraic Property of the Advanced Encryption Standard. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
A Five-Round Algebraic Property of the AES, Algorithm ?, Variants of Algorithm ?, ?AES, AES, Linear Equations |
121 | Tri Van Le, Rüdiger Sparr, Ralph Wernsdorf, Yvo Desmedt |
Complementation-Like and Cyclic Properties of AES Round Functions. |
AES Conference |
2004 |
DBLP DOI BibTeX RDF |
cyclic properties, AES, invariance, Rijndael, self-duality |
117 | Jongsung Kim, Seokhie Hong, Bart Preneel |
Related-Key Rectangle Attacks on Reduced AES-192 and AES-256. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Block Ciphers, AES, Related-Key Rectangle Attack |
110 | Yongzhuang Wei, YuPu Hu |
New related-key rectangle attacks on reduced AES-192 and AES-256. |
Sci. China Ser. F Inf. Sci. |
2009 |
DBLP DOI BibTeX RDF |
block cipher, Advanced Encryption Standard, time complexity, related-key rectangle attack |
104 | Liam Keliher |
Refined Analysis of Bounds Related to Linear and Differential Cryptanalysis for the AES. |
AES Conference |
2004 |
DBLP DOI BibTeX RDF |
SPN, MELP, MEDP, KMT2, KMT2-DC, AES, provable security, differential cryptanalysis, Rijndael, linear cryptanalysis |
100 | Nicolas T. Courtois |
The Inverse S-Box, Non-linear Polynomial Relations and Cryptanalysis of Block Ciphers. |
AES Conference |
2004 |
DBLP DOI BibTeX RDF |
interpolation attack on block ciphers, fractional transformations, homographic functions, generalised linear cryptanalysis, bi-linear cryptanalysis, Block ciphers, AES, Rijndael, Feistel ciphers, multivariate equations |
96 | Jean Monnerat, Serge Vaudenay |
On Some Weak Extensions of AES and BES. |
ICICS |
2004 |
DBLP DOI BibTeX RDF |
AES, Rijndael, BES |
96 | Johannes Blömer, Jean-Pierre Seifert |
Fault Based Cryptanalysis of the Advanced Encryption Standard (AES). |
Financial Cryptography |
2003 |
DBLP DOI BibTeX RDF |
Secure Banking, Smart Cards, AES, Fault Attacks, Implementation Issues |
94 | Norbert Pramstaller, Stefan Mangard, Sandra Dominikus, Johannes Wolkerstorfer |
Efficient AES Implementations on ASICs and FPGAs. |
AES Conference |
2004 |
DBLP DOI BibTeX RDF |
FPGA, Advanced Encryption Standard (AES), ASIC |
89 | Frederik Armknecht, Stefan Lucks |
Linearity of the AES Key Schedule. |
AES Conference |
2004 |
DBLP DOI BibTeX RDF |
|
89 | Christophe Giraud 0001 |
DFA on AES. |
AES Conference |
2004 |
DBLP DOI BibTeX RDF |
|
89 | Alex Biryukov |
The Boomerang Attack on 5 and 6-Round Reduced AES. |
AES Conference |
2004 |
DBLP DOI BibTeX RDF |
|
87 | Sean Murphy, Matthew J. B. Robshaw |
Essential Algebraic Structure within the AES. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
(Finite) Galois Field, (Field) Conjugate, Multivariate Quadratic (MQ) Equations, Advanced Encryption Standard, AES, Rijndael, Algebraic Structure, BES |
81 | Yohei Hori, Akashi Satoh, Hirofumi Sakane, Kenji Toda |
Bitstream encryption and authentication with AES-GCM in dynamically reconfigurable systems. |
FPL |
2008 |
DBLP DOI BibTeX RDF |
|
81 | Daniel J. Bernstein |
The Poly1305-AES Message-Authentication Code. |
FSE |
2005 |
DBLP DOI BibTeX RDF |
|
80 | Marine Minier |
A Three Rounds Property of the AES. |
AES Conference |
2004 |
DBLP DOI BibTeX RDF |
|
80 | Hans Dobbertin, Lars R. Knudsen, Matthew J. B. Robshaw |
The Cryptanalysis of the AES - A Brief Survey. |
AES Conference |
2004 |
DBLP DOI BibTeX RDF |
|
79 | Peter Hellekalek, Stefan Wegenkittl |
Empirical evidence concerning AES. |
ACM Trans. Model. Comput. Simul. |
2003 |
DBLP DOI BibTeX RDF |
block ciphers, AES, diffusion, statistical tests, confusion |
78 | Gang Zhou, Harald Michalik, László Hinsenkamp |
Improving Throughput of AES-GCM with Pipelined Karatsuba Multipliers on FPGAs. |
ARC |
2009 |
DBLP DOI BibTeX RDF |
AES-GCM, pipelined Karatsuba multiplier, FPGAs, finite field arithmetic |
78 | Alireza Hodjat, Ingrid Verbauwhede |
Area-Throughput Trade-Offs for Fully Pipelined 30 to 70 Gbits/s AES Processors. |
IEEE Trans. Computers |
2006 |
DBLP DOI BibTeX RDF |
crypto-processor, security, VLSI, cryptography, Advanced Encryption Standard (AES), ASIC, hardware architectures |
77 | Jun Zhang 0004, Jeffrey G. Andrews |
Distributed Antenna Systems with Randomness. |
IEEE Trans. Wirel. Commun. |
2008 |
DBLP DOI BibTeX RDF |
|
76 | Joan Daemen, Mario Lamberger, Norbert Pramstaller, Vincent Rijmen, Frederik Vercauteren |
Computational aspects of the expected differential probability of 4-round AES and AES-like ciphers. |
Computing |
2009 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classification (2000) 94A60, 11T71 |
76 | Chong Hee Kim, Jean-Jacques Quisquater |
New Differential Fault Analysis on AES Key Schedule: Two Faults Are Enough. |
CARDIS |
2008 |
DBLP DOI BibTeX RDF |
AES key schedule, AES, Fault attack, DFA, Differential Fault Analysis |
75 | Nicolas T. Courtois |
General Principles of Algebraic Attacks and New Design Criteria for Cipher Components. |
AES Conference |
2004 |
DBLP DOI BibTeX RDF |
polynomial relations, design of cryptographic primitives, generalised linear cryptanalysis, multivariate public key encryption and signature schemes, Quartz, combiners with memory, elimination methods, Gröbner bases, Boolean functions, stream ciphers, block ciphers, AES, finite fields, algebraic attacks, Rijndael, Serpent, HFE, Sflash, multivariate equations |
72 | Ryad Benadjila, Olivier Billet, Shay Gueron, Matthew J. B. Robshaw |
The Intel AES Instructions Set and the SHA-3 Candidates. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
72 | Xin-jie Zhao 0001, Tao Wang 0008, Dong Mi, Yuanyuan Zheng, Zhaoyang Lun |
Robust First Two Rounds Access Driven Cache Timing Attack on AES. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
72 | Ricardo Chaves, Georgi Kuzmanov, Stamatis Vassiliadis, Leonel Sousa |
Reconfigurable memory based AES co-processor. |
IPDPS |
2006 |
DBLP DOI BibTeX RDF |
|
72 | Elena Trichina, Tymur Korkishko, Kyung-Hee Lee |
Small Size, Low Power, Side Channel-Immune AES Coprocessor: Design and Synthesis Results. |
AES Conference |
2004 |
DBLP DOI BibTeX RDF |
|
70 | Ewan Fleischmann, Michael Gorski, Stefan Lucks |
Attacking 9 and 10 Rounds of AES-256. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
related-key boomerang attack, block ciphers, AES, differential cryptanalysis |
70 | Hüseyin Demirci, Ihsan Taskin, Mustafa Çoban, Adnan Baysal |
Improved Meet-in-the-Middle Attacks on AES. |
INDOCRYPT |
2009 |
DBLP DOI BibTeX RDF |
cryptanalysis, AES, Rijndael, meet-in-the-middle attack |
70 | Alex Biryukov, Dmitry Khovratovich, Ivica Nikolic |
Distinguisher and Related-Key Attack on the Full AES-256. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
chosen key distinguisher, Davies-Meyer, ideal cipher, AES, related-key attack |
70 | Andrey Bogdanov |
Improved Side-Channel Collision Attacks on AES. |
Selected Areas in Cryptography |
2007 |
DBLP DOI BibTeX RDF |
generalized collisions, AES, side-channel attacks, random graphs, connected components, collision attacks |
70 | Wentao Zhang, Wenling Wu, Dengguo Feng |
New Results on Impossible Differential Cryptanalysis of Reduced AES. |
ICISC |
2007 |
DBLP DOI BibTeX RDF |
cryptanalysis, AES, impossible differentials |
70 | Amir Moradi 0001, Mohammad T. Manzuri Shalmani, Mahmoud Salmasizadeh |
A Generalized Method of Differential Fault Attack Against AES Cryptosystem. |
CHES |
2006 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Smart Card, AES, Side Channel Attacks, Fault Attacks |
70 | Joseph Bonneau, Ilya Mironov |
Cache-Collision Timing Attacks Against AES. |
CHES |
2006 |
DBLP DOI BibTeX RDF |
cache, cryptanalysis, AES, side-channel attack, timing attack |
70 | Stefan Mangard, Kai Schramm |
Pinpointing the Side-Channel Leakage of Masked AES Hardware Implementations. |
CHES |
2006 |
DBLP DOI BibTeX RDF |
Zero-Offset DPA, Zero-Input DPA, Delay Chains, AES, DPA, Masking, Glitches |
70 | Olivier Billet, Henri Gilbert, Charaf Ech-Chatbi |
Cryptanalysis of a White Box AES Implementation. |
Selected Areas in Cryptography |
2004 |
DBLP DOI BibTeX RDF |
white box, implementation, block ciphers, AES, tamper resistance, software piracy |
70 | Dino Oliva, Rainer Buchty, Nevin Heintze |
AES and the cryptonite crypto processor. |
CASES |
2003 |
DBLP DOI BibTeX RDF |
round key generation, architecture, cryptography, AES, processor, high-speed, software implementation, high-bandwidth |
70 | Stefan Mangard |
A Simple Power-Analysis (SPA) Attack on Implementations of the AES Key Expansion. |
ICISC |
2002 |
DBLP DOI BibTeX RDF |
Key Expansion, Smart Cards, AES, Power Analysis, SPA, Key Scheduling |
69 | Nancy Samaan |
Achieving Self-management in a Distributed System of Autonomic BUT Social Entities. |
MACE |
2008 |
DBLP DOI BibTeX RDF |
interdependent utilities, Autonomic computing, utility functions |
69 | Chih-Hsu Yen, Bing-Fei Wu |
Simple Error Detection Methods for Hardware Implementation of Advanced Encryption Standard. |
IEEE Trans. Computers |
2006 |
DBLP DOI BibTeX RDF |
differential fault attacks, Advanced encryption standard, error control code, CRC |
68 | Håvard Raddum |
More Dual Rijndaels. |
AES Conference |
2004 |
DBLP DOI BibTeX RDF |
|
68 | Carlos Cid |
Some Algebraic Aspects of the Advanced Encryption Standard. |
AES Conference |
2004 |
DBLP DOI BibTeX RDF |
|
67 | Mun-Kyu Lee, Jung Ki Min, Seok Hun Kang, Sang-Hwa Chung, Howon Kim 0001, Dong Kyue Kim |
Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection Protocols. |
WISA |
2006 |
DBLP DOI BibTeX RDF |
electronic seal, RFID, AES, message authentication code, pseudorandom function |
65 | Alex Biryukov, Dmitry Khovratovich |
Related-Key Cryptanalysis of the Full AES-192 and AES-256. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
AES, related-key attack, boomerang attack |
64 | Shee-Yau Wu, Shih-Chuan Lu, Chi-Sung Laih |
Design of AES Based on Dual Cipher and Composite Field. |
CT-RSA |
2004 |
DBLP DOI BibTeX RDF |
|
63 | Ilia Toli, Alberto Zanoni |
An Algebraic Interpretation of AES-128. |
AES Conference |
2004 |
DBLP DOI BibTeX RDF |
|
62 | Flavius Opritoiu, Mircea Vladutiu, Lucian Prodan, Mihai Udrescu |
A high-speed AES architecture implementation. |
Conf. Computing Frontiers |
2010 |
DBLP DOI BibTeX RDF |
cryptochip, optimization, fpga, hardware, aes |
62 | Hüseyin Demirci, Ali Aydin Selçuk |
A Meet-in-the-Middle Attack on 8-Round AES. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
meet-in-the-middle cryptanalysis, square attack, AES, Rijndael |
62 | Jörn-Marc Schmidt, Chong Hee Kim |
A Probing Attack on AES. |
WISA |
2008 |
DBLP DOI BibTeX RDF |
Probing Attack, Smart Card, AES |
62 | Jiqiang Lu, Orr Dunkelman, Nathan Keller, Jongsung Kim |
New Impossible Differential Attacks on AES. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
AES, Impossible differential cryptanalysis |
62 | Michael Gorski, Stefan Lucks |
New Related-Key Boomerang Attacks on AES. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
related-key boomerang attack, block ciphers, AES, differential cryptanalysis |
62 | Wentao Zhang, Lei Zhang 0012, Wenling Wu, Dengguo Feng |
Related-Key Differential-Linear Attacks on Reduced AES-192. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
related-key, differential-linear attack, cryptanalysis, AES |
62 | Adam J. Elbirt |
Fast and Efficient Implementation of AES via Instruction Set Extensions. |
AINA Workshops (1) |
2007 |
DBLP DOI BibTeX RDF |
cryptography, block cipher, AES, Galois Field |
62 | Wentao Zhang, Wenling Wu, Lei Zhang 0012, Dengguo Feng |
Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192. |
Selected Areas in Cryptography |
2006 |
DBLP DOI BibTeX RDF |
related-key differentials, cryptanalysis, AES, impossible differentials |
62 | Kazuhiko Minematsu, Yukiyasu Tsunoo |
Provably Secure MACs from Differentially-Uniform Permutations and AES-Based Implementations. |
FSE |
2006 |
DBLP DOI BibTeX RDF |
Differentially-uniform permutation, MAC, Block cipher, AES |
62 | Eli Biham, Orr Dunkelman, Nathan Keller |
Related-Key Impossible Differential Attacks on 8-Round AES-192. |
CT-RSA |
2006 |
DBLP DOI BibTeX RDF |
related-key differentials, AES, impossible differentials |
62 | Kai Schramm, Christof Paar |
Higher Order Masking of the AES. |
CT-RSA |
2006 |
DBLP DOI BibTeX RDF |
Higher Order DPA, Masking Countermeasure, AES |
62 | Jakob Jonsson, Matthew J. B. Robshaw |
Securing RSA-KEM via the AES. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
RSA-KEM, key derivation function, AES |
62 | Siddika Berna Örs, Frank K. Gürkaynak, Elisabeth Oswald, Bart Preneel |
Power-Analysis Attack on an ASIC AES implementation. |
ITCC (2) |
2004 |
DBLP DOI BibTeX RDF |
AES, power analysis attack |
62 | Kai Schramm, Gregor Leander, Patrick Felke, Christof Paar |
A Collision-Attack on AES: Combining Side Channel- and Differential-Attack. |
CHES |
2004 |
DBLP DOI BibTeX RDF |
internal collisions, AES, side channel attacks, birthday paradox |
62 | Chien-Ning Chen, Sung-Ming Yen |
Differential Fault Analysis on AES Key Schedule and Some Coutnermeasures. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
Differential fault analysis (DFA), Smart cards, AES, Rijndael, Physical cryptanalysis |
62 | Gilles Piret, Jean-Jacques Quisquater |
A Differential Fault Attack Technique against SPN Structures, with Application to the AES and KHAZAD. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
Block Ciphers, AES, Side-channel Attacks, Fault Attacks |
61 | Kimmo U. Järvinen, Matti Tommiska, Jorma Skyttä |
A fully pipelined memoryless 17.8 Gbps AES-128 encryptor. |
FPGA |
2003 |
DBLP DOI BibTeX RDF |
FPGA, pipelining, advanced encryption standard (AES) |
61 | Christopher Caltagirone, Kasi Anantha |
High throughput, parallelized 128-bit AES encryption in a resource-limited FPGA. |
SPAA |
2003 |
DBLP DOI BibTeX RDF |
128-bit AES, optimization, FPGA, parallelization, hardware, high-throughput |
60 | Jie Chen 0055, YuPu Hu, Yueyu Zhang |
Impossible differential cryptanalysis of Advanced Encryption Standard. |
Sci. China Ser. F Inf. Sci. |
2007 |
DBLP DOI BibTeX RDF |
cryptanalysis, block cipher, advanced encryption standard, impossible differential cryptanalysis |
58 | Mitsuru Matsui, Junko Nakajima |
On the Power of Bitslice Implementation on Intel Core2 Processor. |
CHES |
2007 |
DBLP DOI BibTeX RDF |
Fast Software Encryption, Bitslice, KASUMI, Core2, AES |
55 | Akashi Satoh, Takeshi Sugawara 0001, Naofumi Homma, Takafumi Aoki |
High-Performance Concurrent Error Detection Scheme for AES Hardware. |
CHES |
2008 |
DBLP DOI BibTeX RDF |
|
55 | Vitalij Ocheretnij, G. Kouznetsov, Ramesh Karri, Michael Gössel |
On-Line Error Detection and BIST for the AES Encryption Algorithm with Different S-Box Implementations. |
IOLTS |
2005 |
DBLP DOI BibTeX RDF |
|
55 | Jingmei Liu, Baodian Wei, Xiangguo Cheng, Xinmei Wang |
An AES S-Box to Increase Complexity and Cryptographic Analysis. |
AINA |
2005 |
DBLP DOI BibTeX RDF |
|
55 | Chih-Chung Lu, Shau-Yin Tseng |
Integrated Design of AES (Advanced Encryption Standard) Encrypter and Decrypter. |
ASAP |
2002 |
DBLP DOI BibTeX RDF |
|
55 | Lars R. Knudsen |
Advanced Encryption Standard (AES) - An Update. |
IMACC |
1999 |
DBLP DOI BibTeX RDF |
|
53 | Alex Tsow |
An Improved Recovery Algorithm for Decayed AES Key Schedule Images. |
Selected Areas in Cryptography |
2009 |
DBLP DOI BibTeX RDF |
anti-tamper, decayed memory, cold-boot attack, AES, digital forensics, key schedule |
53 | Mike Hamburg |
Accelerating AES with Vector Permute Instructions. |
CHES |
2009 |
DBLP DOI BibTeX RDF |
SSSE3, vector permute, cache-timing attacks, AES, fast implementations, composite fields, AltiVec |
53 | Svetla Nikova, Vincent Rijmen, Martin Schläffer |
Using Normal Bases for Compact Hardware Implementations of the AES S-Box. |
SCN |
2008 |
DBLP DOI BibTeX RDF |
AES, hardware implementation, S-box, normal basis |
53 | Monjur Alam, Santosh Ghosh, Dipanwita Roy Chowdhury, Indranil Sengupta 0001 |
Single Chip Encryptor/Decryptor Core Implementation of AES Algorithm. |
VLSI Design |
2008 |
DBLP DOI BibTeX RDF |
AES, Reconfigurable Architecture, S- box, Rijndael, Composite fields |
53 | Shammi Didla, Aaron Ault, Saurabh Bagchi |
Optimizing AES for embedded devices and wireless sensor networks. |
TRIDENTCOM |
2008 |
DBLP DOI BibTeX RDF |
CC2420, Zigbee security, embedded optimizations, secure sensor networks, encryption, AES, MSP430 |
53 | Babak Zakeri, Mahmoud Salmasizadeh, Amir Moradi 0001, Mahmoud Tabandeh, Mohammad T. Manzuri Shalmani |
Compact and Secure Design of Masked AES S-Box. |
ICICS |
2007 |
DBLP DOI BibTeX RDF |
Composite field arithmetic, AES, Side-Channel Attack, Masking |
53 | Christoph Herbst, Elisabeth Oswald, Stefan Mangard |
An AES Smart Card Implementation Resistant to Power Analysis Attacks. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
DPA resistance, smart card, AES |
53 | Johannes Buchmann 0001, Andrei Pyshkin, Ralf-Philipp Weinmann |
A Zero-Dimensional Gröbner Basis for AES-128. |
FSE |
2006 |
DBLP DOI BibTeX RDF |
Gröbner bases, block ciphers, AES, Rijndael |
53 | Guido Bertoni, Vittorio Zaccaria, Luca Breveglieri, Matteo Monchiero, Gianluca Palermo |
AES Power Attack Based on Induced Cache Miss and Countermeasure. |
ITCC (1) |
2005 |
DBLP DOI BibTeX RDF |
Cache, Block Cipher, AES, Power Analysis, Cache Miss |
53 | Jovan Dj. Golic, Christophe Tymen |
Multiplicative Masking and Power Analysis of AES. |
CHES |
2002 |
DBLP DOI BibTeX RDF |
multiplicative masking, AES, differential power analysis, countermeasures |
52 | Stefan Tillich, Martin Feldhofer, Thomas Popp, Johann Großschädl |
Area, Delay, and Power Characteristics of Standard-Cell Implementations of the AES S-Box. |
J. Signal Process. Syst. |
2008 |
DBLP DOI BibTeX RDF |
substitution box (S-box), inversion in the finite field GF($28$), standard cell implementation, Advanced Encryption Standard (AES), power consumption, silicon area, critical path delay |
52 | Zhenglin Liu, Xu Guo, Yi-Cheng Chen, Yu Han, Xuecheng Zou |
On the Ability of AES S-Boxes to Secure Against Correlation Power Analysis. |
ISPEC |
2007 |
DBLP DOI BibTeX RDF |
correlation power analysis (CPA), Advanced Encryption Standard (AES), hamming distance, correlation coefficient |
52 | Hui Qin, Tsutomu Sasao, Yukihiro Iguchi |
An FPGA design of AES encryption circuit with 128-bit keys. |
ACM Great Lakes Symposium on VLSI |
2005 |
DBLP DOI BibTeX RDF |
AES encryption, FPGA, pipeline |
52 | Martin Feldhofer, Sandra Dominikus, Johannes Wolkerstorfer |
Strong Authentication for RFID Systems Using the AES Algorithm. |
CHES |
2004 |
DBLP DOI BibTeX RDF |
symmetric challenge-response, Radio frequency identification (RFID), low-power design, Advanced Encryption Standard (AES) |
51 | Goce Jakimoski, K. P. Subbalakshmi |
On Efficient Message Authentication Via Block Cipher Design Techniques. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
Wegman-Carter construction, maximum differential probability, block ciphers, Message authentication, universal hash functions |
51 | Guido Bertoni, A. Bircan, Luca Breveglieri, Pasqualina Fragneto, Marco Macchetti, Vittorio Zaccaria |
About the performances of the Advanced Encryption Standard in embedded systems with cache memory. |
ISCAS (5) |
2003 |
DBLP DOI BibTeX RDF |
|
51 | Hans Dobbertin, Vincent Rijmen, Aleksandra Sowa (eds.) |
Advanced Encryption Standard - AES, 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papers |
AES Conference |
2005 |
DBLP DOI BibTeX RDF |
|
51 | Vincent Rijmen, Elisabeth Oswald |
Representations and Rijndael Descriptions. |
AES Conference |
2004 |
DBLP DOI BibTeX RDF |
|
51 | Thomas J. Wollinger, Min Wang, Jorge Guajardo, Christof Paar |
How Well Are High-End DSPs Suited for the AES Algorithms? AES Algorithms on the TMS320C6x DSP. |
AES Candidate Conference |
2000 |
DBLP BibTeX RDF |
|
50 | Jude Angelo Ambrose, Sri Parameswaran, Aleksandar Ignjatovic |
MUTE-AES: a multiprocessor architecture to prevent power analysis based side channel attack of the AES algorithm. |
ICCAD |
2008 |
DBLP DOI BibTeX RDF |
|
49 | Chu-Wee Lim, Khoongming Khoo |
An Analysis of XSL Applied to BES. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
XSL algorithm, AES, linearisation, BES |
49 | Carlos Cid, Gaëtan Leurent |
An Analysis of the XSL Algorithm. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
XSL algorithm, T? method, AES, Linearization |
49 | Guido Bertoni, Luca Breveglieri, Israel Koren, Paolo Maistri, Vincenzo Piuri |
Error Analysis and Detection Procedures for a Hardware Implementation of the Advanced Encryption Standard. |
IEEE Trans. Computers |
2003 |
DBLP DOI BibTeX RDF |
parity codes, fault tolerance, fault detection, Advanced Encryption Standard, AES |
47 | Wen-Ai Jackson, S. Murphy |
Projective aspects of the AES inversion. |
Des. Codes Cryptogr. |
2007 |
DBLP DOI BibTeX RDF |
51E15, AMS Classifications 94A60 |
47 | Abdul Samiah, Arshad Aziz, Nassar Ikram |
An Efficient Software Implementation of AES-CCM for IEEE 802.11i Wireless St. |
COMPSAC (2) |
2007 |
DBLP DOI BibTeX RDF |
|
47 | Junko Takahashi, Toshinori Fukunaga, Kimihiro Yamakoshi |
DFA Mechanism on the AES Key Schedule. |
FDTC |
2007 |
DBLP DOI BibTeX RDF |
|
47 | Dyi-Rong Duh, Tsung-Chi Lin, Chi-Ho Tung, Shin-Jie Chan |
An Implementation of AES Algorithm with the Multiple Spaces Random Key Pre-Distribution Scheme on MOTE-KIT 5040. |
SUTC (2) |
2006 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 2665 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|