The Impact of Confidentiality on Quality of Service in Heterogeneous Voice over IP Networks
MMNS '01 Proceedings of the 4th IFIP/IEEE International Conference on Management of Multimedia Networks and Services: Management of Multimedia on the Internet
Hamming Weight Attacks on Cryptographic Hardware - Breaking Masking Defense
ESORICS '02 Proceedings of the 7th European Symposium on Research in Computer Security
On Differential Properties of Pseudo-Hadamard Transform and Related Mappings
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
FSE '01 Revised Papers from the 8th International Workshop on Fast Software Encryption
Fast Software Implementations of SC2000
ISC '02 Proceedings of the 5th International Conference on Information Security
Using Second-Order Power Analysis to Attack DPA Resistant Software
CHES '00 Proceedings of the Second International Workshop on Cryptographic Hardware and Embedded Systems
The Saturation Attack - A Bait for Twofish
FSE '01 Revised Papers from the 8th International Workshop on Fast Software Encryption
High Performance DES Encryption in Virtex(tm) FPGAs Using Jbits(tm)
FCCM '00 Proceedings of the 2000 IEEE Symposium on Field-Programmable Custom Computing Machines
Architectural techniques for accelerating subword permutations with repetitions
IEEE Transactions on Very Large Scale Integration (VLSI) Systems - Special section on the 2001 international conference on computer design (ICCD)
Survey and benchmark of block ciphers for wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Mobile Networks and Applications
Storing and retrieving multimedia web notes
International Journal of Computational Science and Engineering
Fast Software Encryption
An Empirical Study on the Performance of Java/.Net Cryptographic APIs
Information Systems Security
Algorithm level evaluation of cryptosystem resistance to second-order DPA
CNIS '07 Proceedings of the Fourth IASTED International Conference on Communication, Network and Information Security
ContikiSec: A Secure Network Layer for Wireless Sensor Networks under the Contiki Operating System
NordSec '09 Proceedings of the 14th Nordic Conference on Secure IT Systems: Identity and Privacy in the Internet Age
Key dependent operation and algorithm specific complexity of statistical side channel attacks
ICT'09 Proceedings of the 16th international conference on Telecommunications
ICISS'07 Proceedings of the 3rd international conference on Information systems security
The differential analysis of S-functions
SAC'10 Proceedings of the 17th international conference on Selected areas in cryptography
Search for related-key differential characteristics in DES-like ciphers
FSE'11 Proceedings of the 18th international conference on Fast software encryption
Perfect diffusion primitives for block ciphers
SAC'04 Proceedings of the 11th international conference on Selected Areas in Cryptography
Functional correctness proofs of encryption algorithms
LPAR'05 Proceedings of the 12th international conference on Logic for Programming, Artificial Intelligence, and Reasoning
Solving systems of differential equations of addition
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Near optimal algorithms for solving differential equations of addition with batch queries
INDOCRYPT'05 Proceedings of the 6th international conference on Cryptology in India
A cryptographic algorithm based on hybrid cubes
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part IV
The design and implementation of secure socket SCTP
Transactions on Computational Science VI
Local Shannon entropy measure with statistical tests for image randomness
Information Sciences: an International Journal
Design of image cipher using latin squares
Information Sciences: an International Journal
Hi-index | 0.01 |