A fully pipelined memoryless 17.8 Gbps AES-128 encryptor
FPGA '03 Proceedings of the 2003 ACM/SIGDA eleventh international symposium on Field programmable gate arrays
A New Version of the Stream Cipher SNOW
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
White-Box Cryptography and an AES Implementation
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
Essential Algebraic Structure within the AES
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
Security of a Wide Trail Design
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
Fast Software Implementations of SC2000
ISC '02 Proceedings of the 5th International Conference on Information Security
Simplified Adaptive Multiplicative Masking for AES
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
The advanced encryption standard
Cryptologia
A Highly Regular and Scalable AES Hardware Architecture
IEEE Transactions on Computers
Efficient galois field arithmetic on SIMD architectures
Proceedings of the fifteenth annual ACM symposium on Parallel algorithms and architectures
Payment technologies for E-commerce
Empirical evidence concerning AES
ACM Transactions on Modeling and Computer Simulation (TOMACS)
A 2 Gb/s balanced AES crypto-chip implementation
Proceedings of the 14th ACM Great Lakes symposium on VLSI
Attacking and repairing the winZip encryption scheme
Proceedings of the 11th ACM conference on Computer and communications security
A 10-Gbps full-AES crypto design with a twisted BDD S-box architecture
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Hardware and Binary Modification Support for Code Pointer Protection From Buffer Overflow
Proceedings of the 37th annual IEEE/ACM International Symposium on Microarchitecture
Design and Analysis of Dual-Rail Circuits for Security Applications
IEEE Transactions on Computers
The use of cryptography to create data file security: with the Rijndael cipher block
Journal of Computing Sciences in Colleges
A High Performance Sub-Pipelined Architecture for AES
ICCD '05 Proceedings of the 2005 International Conference on Computer Design
A proposed curriculum of cryptography courses
InfoSecCD '05 Proceedings of the 2nd annual conference on Information security curriculum development
A Totally Self-Checking S-box Architecture for the Advanced Encryption Standard
ISQED '06 Proceedings of the 7th International Symposium on Quality Electronic Design
Cryptanalysis of the "Grain" family of stream ciphers
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Attribute-Based Access Control with Hidden Policies and Hidden Credentials
IEEE Transactions on Computers
Privacy-Preserving Computation of Bayesian Networks on Vertically Partitioned Data
IEEE Transactions on Knowledge and Data Engineering
Performance analysis of binary code protection
WSC '05 Proceedings of the 37th conference on Winter simulation
AES Efficient implementation for extensible firmware interface
MS'06 Proceedings of the 17th IASTED international conference on Modelling and simulation
A new security architecture for mobile communication
MS'06 Proceedings of the 17th IASTED international conference on Modelling and simulation
A Framework for Describing Block Cipher Cryptanalysis
IEEE Transactions on Computers
The design of composite permutations with applications to DES-like S-boxes
Designs, Codes and Cryptography
Analysis of security problems in a medical image encryption system
Computers in Biology and Medicine
A generic characterization of the overheads imposed by IPsec and associated cryptographic algorithms
Computer Networks: The International Journal of Computer and Telecommunications Networking
The Journal of Supercomputing
A survey of recent developments in cryptographic algorithms for smart cards
Computer Networks: The International Journal of Computer and Telecommunications Networking
Rendezvous-based access control for medical records in the pre-hospital environment
Proceedings of the 1st ACM SIGMOBILE international workshop on Systems and networking support for healthcare and assisted living environments
On the implementation of the advanced encryption standard on a public-key crypto-coprocessor
CARDIS'02 Proceedings of the 5th conference on Smart Card Research and Advanced Application Conference - Volume 5
Where's the FEEB? the effectiveness of instruction set randomization
SSYM'05 Proceedings of the 14th conference on USENIX Security Symposium - Volume 14
Facilitating focused internet measurements
Proceedings of the 2007 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
High-speed & Low Area Hardware Architectures of the Whirlpool Hash Function
Journal of VLSI Signal Processing Systems
Projective aspects of the AES inversion
Designs, Codes and Cryptography
Energy evaluation of software implementations of block ciphers under memory constraints
Proceedings of the conference on Design, automation and test in Europe
An area optimized reconfigurable encryptor for AES-Rijndael
Proceedings of the conference on Design, automation and test in Europe
TestU01: A C library for empirical testing of random number generators
ACM Transactions on Mathematical Software (TOMS)
Nondeterministic Multithreading
IEEE Transactions on Computers
On the design of error-correcting ciphers
EURASIP Journal on Wireless Communications and Networking
Drm to counter side-channel attacks?
Proceedings of the 2007 ACM workshop on Digital Rights Management
Mechanism for software tamper resistance: an application of white-box cryptography
Proceedings of the 2007 ACM workshop on Digital Rights Management
Mobile Networks and Applications
Designs, Codes and Cryptography
A survey of homomorphic encryption for nonspecialists
EURASIP Journal on Information Security
Transmission error and compression robustness of 2D chaotic map image encryption schemes
EURASIP Journal on Information Security
Vector processing as a soft-core CPU accelerator
Proceedings of the 16th international ACM/SIGDA symposium on Field programmable gate arrays
Modeling and simulation of common primitive operations used in block ciphers
Proceedings of the 2007 Summer Computer Simulation Conference
DotGrid: a.NET-based cross-platform software for desktop grids
International Journal of Web and Grid Services
Three ways to mount distinguishing attacks on irregularly clocked stream ciphers
International Journal of Security and Networks
Designing substitution boxes for secure ciphers
International Journal of Innovative Computing and Applications
Implementation of secure applications in self-reconfigurable systems
Microprocessors & Microsystems
Robust, anonymous RFID authentication with constant key-lookup
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Accelerated AES implementations via generalized instruction set extensions
Journal of Computer Security - The Third IEEE International Symposium on Security in Networks and Distributed Systems
Area, delay, and power characteristics of standard-cell implementations of the AES S-Box
Journal of Signal Processing Systems - Special Issue: Embedded computing systems for DSP
On the management of grid credentials
Proceedings of the 5th international workshop on Middleware for grid computing: held at the ACM/IFIP/USENIX 8th International Middleware Conference
Reconfigurable hardware for high-security/high-performance embedded systems: the SAFES perspective
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
FPGA implementation(s) of a scalable encryption algorithm
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Joint encryption and compression of correlated sources with side information
EURASIP Journal on Information Security
NOYB: privacy in online social networks
Proceedings of the first workshop on Online social networks
Merged computation for Whirlpool hashing
Proceedings of the conference on Design, automation and test in Europe
A novel AES cryptographic core highly resistant to differential power analysis attacks
Proceedings of the 21st annual symposium on Integrated circuits and system design
Solving Multiple Right Hand Sides linear equations
Designs, Codes and Cryptography
Design and analysis of WiMAX's security system on FPGA
EHAC'08 Proceedings of the 7th WSEAS International Conference on Electronics, Hardware, Wireless and Optical Communications
Aspects of airborne continuous surveillance systems: practical image encryption module
MMACTEE'08 Proceedings of the 10th WSEAS International Conference on Mathematical Methods and Computational Techniques in Electrical Engineering
VLSI Implementation of a Functional Unit to Accelerate ECC and AES on 32-Bit Processors
WAIFI '07 Proceedings of the 1st international workshop on Arithmetic of Finite Fields
Collision Attacks on AES-Based MAC: Alpha-MAC
CHES '07 Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems
Differential Behavioral Analysis
CHES '07 Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems
PRESENT: An Ultra-Lightweight Block Cipher
CHES '07 Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems
Design of a New Stream Cipher--LEX
New Stream Cipher Designs
New Stream Cipher Designs
Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers
ACISP '08 Proceedings of the 13th Australasian conference on Information Security and Privacy
Efficient Finite Fields in the Maxima Computer Algebra System
WAIFI '08 Proceedings of the 2nd international workshop on Arithmetic of Finite Fields
On Cryptographically Significant Mappings over GF(2n)
WAIFI '08 Proceedings of the 2nd international workshop on Arithmetic of Finite Fields
Light-Weight Instruction Set Extensions for Bit-Sliced Cryptography
CHES '08 Proceeding sof the 10th international workshop on Cryptographic Hardware and Embedded Systems
SmartPro: A Smart Card Based Digital Content Protection for Professional Workflow
CARDIS '08 Proceedings of the 8th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
A Secure Cross-Layer Protocol for Multi-hop Wireless Body Area Networks
ADHOC-NOW '08 Proceedings of the 7th international conference on Ad-hoc, Mobile and Wireless Networks
Improved Impossible Differential Attacks on Large-Block Rijndael
ISC '08 Proceedings of the 11th international conference on Information Security
New Applications of Differential Bounds of the SDS Structure
ISC '08 Proceedings of the 11th international conference on Information Security
A New DPA Countermeasure Based on Permutation Tables
SCN '08 Proceedings of the 6th international conference on Security and Cryptography for Networks
Group theoretic properties of Rijndael-like ciphers
Discrete Applied Mathematics
Algebraic Attacks on the Courtois Toy Cipher
Cryptologia
Deconstructing new cache designs for thwarting software cache-based side channel attacks
Proceedings of the 2nd ACM workshop on Computer security architectures
Public-key traitor tracing from efficient decoding and unbounded enrollment: extended abstract
Proceedings of the 8th ACM workshop on Digital rights management
Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries
International Journal of Applied Cryptography
An optimized pseudorandom generator using packed matrices
WSEAS Transactions on Information Science and Applications
Embedded real-time video encryption module on UAV surveillance systems
WSEAS Transactions on Circuits and Systems
INDOCRYPT '08 Proceedings of the 9th International Conference on Cryptology in India: Progress in Cryptology
New Related-Key Boomerang Attacks on AES
INDOCRYPT '08 Proceedings of the 9th International Conference on Cryptology in India: Progress in Cryptology
New Impossible Differential Attacks on AES
INDOCRYPT '08 Proceedings of the 9th International Conference on Cryptology in India: Progress in Cryptology
Slide Attacks on a Class of Hash Functions
ASIACRYPT '08 Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
A New Attack on the LEX Stream Cipher
ASIACRYPT '08 Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
WSEAS Transactions on Computers
ICISS '08 Proceedings of the 4th International Conference on Information Systems Security
Provable security of block ciphers against linear cryptanalysis: a mission impossible?
Designs, Codes and Cryptography
On the design of reconfigurable multipliers for integer and Galois field multiplication
Microprocessors & Microsystems
Complete information flow tracking from the gates up
Proceedings of the 14th international conference on Architectural support for programming languages and operating systems
On Generalized Feistel Structures Using the Diffusion Switching Mechanism
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
A simple encryption strategy based on addition
Journal of Computing Sciences in Colleges
An efficient proxy raffle protocol with anonymity-preserving
Computer Standards & Interfaces
A new hash family obtained by modifying the SHA-2 family
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
Twister --- A Framework for Secure and Fast Hash Functions
ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience
Vector Processing as a Soft Processor Accelerator
ACM Transactions on Reconfigurable Technology and Systems (TRETS)
End-to-end delay analysis of wireless ECG over cellular networks
Proceedings of the 1st ACM international workshop on Medical-grade wireless networks
Designs, Codes and Cryptography
Simulation study of the functioning of LFSR for grade 4 irreducible polynomials
SEPADS'09 Proceedings of the 8th WSEAS International Conference on Software engineering, parallel and distributed systems
Statistical Strength of a Hybrid Cryptosystem on 2-D Cellular Automata with Nonaffine Rotations
KES-AMSTA '09 Proceedings of the Third KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications
Distinguishers for Ciphers and Known Key Attack against Rijndael with Large Blocks
AFRICACRYPT '09 Proceedings of the 2nd International Conference on Cryptology in Africa: Progress in Cryptology
An Improved Fault Based Attack of the Advanced Encryption Standard
AFRICACRYPT '09 Proceedings of the 2nd International Conference on Cryptology in Africa: Progress in Cryptology
Attacking 9 and 10 Rounds of AES-256
ACISP '09 Proceedings of the 14th Australasian Conference on Information Security and Privacy
Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure
ACISP '09 Proceedings of the 14th Australasian Conference on Information Security and Privacy
Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT
ACISP '09 Proceedings of the 14th Australasian Conference on Information Security and Privacy
Interactions between computer algebra (Gröbner bases) and cryptology
Proceedings of the 2009 international symposium on Symbolic and algebraic computation
WMNSec: security for wireless mesh networks
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
On a Construction of Short Digests for Authenticating Ad Hoc Networks
ICCSA '09 Proceedings of the International Conference on Computational Science and Its Applications: Part II
Distributed Privilege Enforcement in PACS
Proceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security XXIII
Spectrally Efficient Frequency Hopping System Design under Hostile Jamming
WASA '09 Proceedings of the 4th International Conference on Wireless Algorithms, Systems, and Applications
A framework for identity privacy in SIP
Journal of Network and Computer Applications
Non-deterministic processors: FPGA-based analysis of area, performance and security
WESS '09 Proceedings of the 4th Workshop on Embedded Systems Security
Securing bulk content almost for free
Computer Communications
Comments on two anonymous conference key distribution systems
Computer Standards & Interfaces
Securing AODV against wormhole attacks in emergency MANET multimedia communications
Proceedings of the 5th International ICST Mobile Multimedia Communications Conference
Application and performance analysis of various AEAD techniques for space telecommand authentication
IEEE Transactions on Wireless Communications
A compact ASIC implementation of the advanced encryption standard with concurrent error detection
CSS '07 Proceedings of the Fifth IASTED International Conference on Circuits, Signals and Systems
DSPs, BRAMs, and a Pinch of Logic: Extended Recipes for AES on FPGAs
ACM Transactions on Reconfigurable Technology and Systems (TRETS)
Execution leases: a hardware-supported mechanism for enforcing strong non-interference
Proceedings of the 42nd Annual IEEE/ACM International Symposium on Microarchitecture
Efficient tweakable enciphering schemes from (block-wise) universal hash functions
IEEE Transactions on Information Theory
Algebraic immunity of S-boxes based on power mappings: analysis and construction
IEEE Transactions on Information Theory
ContikiSec: A Secure Network Layer for Wireless Sensor Networks under the Contiki Operating System
NordSec '09 Proceedings of the 14th Nordic Conference on Secure IT Systems: Identity and Privacy in the Internet Age
Solving Structured Polynomial Systems and Applications to Cryptology
CASC '09 Proceedings of the 11th International Workshop on Computer Algebra in Scientific Computing
An E-Cash Based Implementation Model for Facilitating Anonymous Purchasing of Information Products
ICISS '09 Proceedings of the 5th International Conference on Information Systems Security
Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Related-Key Cryptanalysis of the Full AES-192 and AES-256
ASIACRYPT '09 Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Rebound Distinguishers: Results on the Full Whirlpool Compression Function
ASIACRYPT '09 Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
The Intel AES Instructions Set and the SHA-3 Candidates
ASIACRYPT '09 Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Key dependent operation and algorithm specific complexity of statistical side channel attacks
ICT'09 Proceedings of the 16th international conference on Telecommunications
Implementation of real time DMB encryption on mobile environment for contents protection
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 3
Accurate modeling for predicting cryptography overheads on wireless sensor nodes
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 2
Detecting intrusion faults in remotely controlled systems
ACC'09 Proceedings of the 2009 conference on American Control Conference
Performance Evaluation of Security Protocols Specified in LySa
Electronic Notes in Theoretical Computer Science (ENTCS)
A Quantitative Study of Two Attacks
Electronic Notes in Theoretical Computer Science (ENTCS)
Bridging the gap between symbolic and efficient AES implementations
Proceedings of the 2010 ACM SIGPLAN workshop on Partial evaluation and program manipulation
Virtual reality applied to the management, planning and optimization of surgical interventions
BIOCOMPUCHEM'09 Proceedings of the 3rd WSEAS International Conference on Computational Chemistry
Information Processing Letters
Secure transcoders for single layer video data
Image Communication
The effects of the omission of last round's MixColumns on AES
Information Processing Letters
The design of a stream cipher LEX
SAC'06 Proceedings of the 13th international conference on Selected areas in cryptography
Dial C for cipher: le chiffrement était presque parfait
SAC'06 Proceedings of the 13th international conference on Selected areas in cryptography
Advances on access-driven cache attacks on AES
SAC'06 Proceedings of the 13th international conference on Selected areas in cryptography
Partial encryption of digital contents using face detection algorithm
PRICAI'06 Proceedings of the 9th Pacific Rim international conference on Artificial intelligence
A linear analysis of Blowfish and Khufu
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
Differential fault analysis on AES key schedule and some countermeasures
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
VECPAR'06 Proceedings of the 7th international conference on High performance computing for computational science
A simple power-analysis (SPA) attack on implementations of the AES key expansion
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
A performance evaluation of intrusion-tolerant routing in wireless sensor networks
IPSN'03 Proceedings of the 2nd international conference on Information processing in sensor networks
A toolbox for cryptanalysis: linear and affine equivalence algorithms
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
A theoretical treatment of related-key attacks: RKA-PRPS, RKA-PRFs, and applications
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
An analysis of the Hermes8 stream ciphers
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
Symmetric key cryptography on modern graphics hardware
ASIACRYPT'07 Proceedings of the Advances in Crypotology 13th international conference on Theory and application of cryptology and information security
ASIACRYPT'07 Proceedings of the Advances in Crypotology 13th international conference on Theory and application of cryptology and information security
Cryptanalysis of the CRUSH hash function
SAC'07 Proceedings of the 14th international conference on Selected areas in cryptography
Analysis of countermeasures against access driven cache attacks on AES
SAC'07 Proceedings of the 14th international conference on Selected areas in cryptography
Square like attack on camellia
ICICS'07 Proceedings of the 9th international conference on Information and communications security
VLSI implementation of a non-linear feedback shift register for high-speed cryptography applications
Proceedings of the 20th symposium on Great lakes symposium on VLSI
Color image encryption based on one-time keys and robust chaotic maps
Computers & Mathematics with Applications
A high-speed AES architecture implementation
Proceedings of the 7th ACM international conference on Computing frontiers
Improving integral attacks against Rijndael-256 up to 9 rounds
AFRICACRYPT'08 Proceedings of the Cryptology in Africa 1st international conference on Progress in cryptology
A very compact "Perfectly masked" S-box for AES
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
Boosting AES performance on a tiny processor core
CT-RSA'08 Proceedings of the 2008 The Cryptopgraphers' Track at the RSA conference on Topics in cryptology
The design and implementation of tamper resistance for mobile game service
Mobile Information Systems - Mobile and Wireless Networks
Journal of Visual Communication and Image Representation
Joint watermarking and encryption of color images in the Fibonacci-Haar domain
EURASIP Journal on Advances in Signal Processing
Algorithms for sensor and ad hoc networks: advanced lectures
Algorithms for sensor and ad hoc networks: advanced lectures
DES with any reduced masked rounds is not secure against side-channel attacks
Computers & Mathematics with Applications
Cryptanalysis of substitution cipher chaining mode (SCC)
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Whirlwind: a new cryptographic hash function
Designs, Codes and Cryptography
TWISTERπ – a framework for secure and fast hash functions
International Journal of Applied Cryptography
AES and confidentiality from the inside out
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
An approach for node identification and key management in sensor grids
Proceedings of the 11th International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing on International Conference on Computer Systems and Technologies
On the differential and linear efficiency of balanced Feistel networks
Information Processing Letters
CELICA: a multi-agent communication system for electronic commerce
ECC'10 Proceedings of the 4th conference on European computing conference
TrustStore: Making Amazon S3 Trustworthy with Services Composition
CCGRID '10 Proceedings of the 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing
Secure passwords through enhanced hashing
LISA'09 Proceedings of the 23rd conference on Large installation system administration
Evaluation of Random Delay Insertion against DPA on FPGAs
ACM Transactions on Reconfigurable Technology and Systems (TRETS)
Pseudo-random functions and parallelizable modes of operations of a block cipher
IEEE Transactions on Information Theory
AISC '09 Proceedings of the Seventh Australasian Conference on Information Security - Volume 98
Input generation via decomposition and re-stitching: finding bugs in Malware
Proceedings of the 17th ACM conference on Computer and communications security
A chameleon encryption scheme resistant to known-plaintext attack
Proceedings of the tenth annual ACM workshop on Digital rights management
WESS '10 Proceedings of the 5th Workshop on Embedded Systems Security
Countermeasures against fault attacks on software implemented AES: effectiveness and cost
WESS '10 Proceedings of the 5th Workshop on Embedded Systems Security
Robust combiners for software hardening
TRUST'10 Proceedings of the 3rd international conference on Trust and trustworthy computing
FSE'10 Proceedings of the 17th international conference on Fast software encryption
Super-Sbox cryptanalysis: improved attacks for AES-like permutations
FSE'10 Proceedings of the 17th international conference on Fast software encryption
A Simple and Generic Construction of Authenticated Encryption with Associated Data
ACM Transactions on Information and System Security (TISSEC)
Improved differential attacks for ECHO and Grøstl
CRYPTO'10 Proceedings of the 30th annual conference on Advances in cryptology
Performance analysis of the SHA-3 candidates on exotic multi-core architectures
CHES'10 Proceedings of the 12th international conference on Cryptographic hardware and embedded systems
Provably secure higher-order masking of AES
CHES'10 Proceedings of the 12th international conference on Cryptographic hardware and embedded systems
Data aggregation integrity based on homomorphic primitives in sensor networks
ADHOC-NOW'10 Proceedings of the 9th international conference on Ad-hoc, mobile and wireless networks
Side-channel analysis of cryptographic software via early-terminating multiplications
ICISC'09 Proceedings of the 12th international conference on Information security and cryptology
Efficient software implementation of binary field arithmetic using vector instruction sets
LATINCRYPT'10 Proceedings of the First international conference on Progress in cryptology: cryptology and information security in Latin America
LATINCRYPT'10 Proceedings of the First international conference on Progress in cryptology: cryptology and information security in Latin America
Cryptography for network security: failures, successes and challenges
MMM-ACNS'10 Proceedings of the 5th international conference on Mathematical methods, models and architectures for computer network security
A predictive model for cache-based side channels in multicore and multithreaded microprocessors
MMM-ACNS'10 Proceedings of the 5th international conference on Mathematical methods, models and architectures for computer network security
Differential fault analysis of LEX
SCN'10 Proceedings of the 7th international conference on Security and cryptography for networks
A personalized framework for medication treatment management in chronic care
IEEE Transactions on Information Technology in Biomedicine - Special section on affective and pervasive computing for healthcare
Secure communication framework for e-commerce environments
ACS'09 Proceedings of the 9th WSEAS international conference on Applied computer science
Investigation of fault propagation in encryption of satellite images using the AES algorithm
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Joint distributed compression and encryption of correlated data in sensor networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Base line performance measurements of access controls for libraries and modules
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
Reconfigurable memory based AES co-processor
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
Security analysis of a fingerprint-protected USB drive
Proceedings of the 26th Annual Computer Security Applications Conference
Known-key attacks on Rijndael with large blocks and strengthening shiftrow parameter
IWSEC'10 Proceedings of the 5th international conference on Advances in information and computer security
Programmable cellular automata (PCA) based advanced encryption standard (AES) hardware architecture
ACRI'10 Proceedings of the 9th international conference on Cellular automata for research and industry
A NoC-based hybrid message-passing/shared-memory approach to CMP design
Microprocessors & Microsystems
Enhancing the performance of symmetric-key cryptography via instruction set extensions
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Full-round differential attack on TWIS block cipher
WISA'10 Proceedings of the 11th international conference on Information security applications
Improved trace-driven cache-collision attacks against embedded AES implementations
WISA'10 Proceedings of the 11th international conference on Information security applications
Integral cryptanalysis of ARIA
Inscrypt'09 Proceedings of the 5th international conference on Information security and cryptology
Proposition of two cipher structures
Inscrypt'09 Proceedings of the 5th international conference on Information security and cryptology
Linearity within the SMS4 block cipher
Inscrypt'09 Proceedings of the 5th international conference on Information security and cryptology
Joint scheme for physical layer error correction and security
ISRN Communications and Networking
Implementation and testing of high-speed CMOS true random number generators based on chaotic systems
IEEE Transactions on Circuits and Systems Part I: Regular Papers - Special section on 2009 IEEE system-on-chip conference
AONT-RS: blending security and performance in dispersed storage systems
FAST'11 Proceedings of the 9th USENIX conference on File and stroage technologies
The differential analysis of S-functions
SAC'10 Proceedings of the 17th international conference on Selected areas in cryptography
SAC'10 Proceedings of the 17th international conference on Selected areas in cryptography
On the diffusion of generalized Feistel structures regarding differential and linear cryptanalysis
SAC'10 Proceedings of the 17th international conference on Selected areas in cryptography
Affine masking against higher-order side channel analysis
SAC'10 Proceedings of the 17th international conference on Selected areas in cryptography
Subspace distinguisher for 5/8 rounds of the ECHO-256 hash function
SAC'10 Proceedings of the 17th international conference on Selected areas in cryptography
Critique of the related-key attack concept
Designs, Codes and Cryptography
On unbalanced Feistel networks with contracting MDS diffusion
Designs, Codes and Cryptography
Searching for a different AES-class MixColumns operation
ACS'06 Proceedings of the 6th WSEAS international conference on Applied computer science
Analysis of 3-line generalized Feistel networks with double SD-functions
Information Processing Letters
Implementation of a cryptographic co-processor
ISP'07 Proceedings of the 6th WSEAS international conference on Information security and privacy
Towards non-black-box lower bounds in cryptography
TCC'11 Proceedings of the 8th conference on Theory of cryptography
Cryptographic properties and application of a Generalized Unbalanced Feistel Network structure
Cryptography and Communications
Pushing the limits: a very compact and a threshold implementation of AES
EUROCRYPT'11 Proceedings of the 30th Annual international conference on Theory and applications of cryptographic techniques: advances in cryptology
On linear hulls, statistical saturation attacks, PRESENT and a cryptanalysis of PUFFIN
EUROCRYPT'11 Proceedings of the 30th Annual international conference on Theory and applications of cryptographic techniques: advances in cryptology
New impossible differential and known-key distinguishers for the 3D cipher
ISPEC'11 Proceedings of the 7th international conference on Information security practice and experience
BCBC: a more efficient MAC algorithm
ISPEC'11 Proceedings of the 7th international conference on Information security practice and experience
CrowdLogging: distributed, private, and anonymous search logging
Proceedings of the 34th international ACM SIGIR conference on Research and development in Information Retrieval
Can code polymorphism limit information leakage?
WISTP'11 Proceedings of the 5th IFIP WG 11.2 international conference on Information security theory and practice: security and privacy of mobile devices in wireless communication
A SMS-based mobile Botnet using flooding algorithm
WISTP'11 Proceedings of the 5th IFIP WG 11.2 international conference on Information security theory and practice: security and privacy of mobile devices in wireless communication
Analysis of reduced-SHAvite-3-256 v2
FSE'11 Proceedings of the 18th international conference on Fast software encryption
Meet-in-the-middle preimage attacks on AES hashing modes and an application to whirlpool
FSE'11 Proceedings of the 18th international conference on Fast software encryption
Improving the message expansion of the tangle hash function
CISIS'11 Proceedings of the 4th international conference on Computational intelligence in security for information systems
Cold boot key recovery by solving polynomial systems with noise
ACNS'11 Proceedings of the 9th international conference on Applied cryptography and network security
LBlock: a lightweight block cipher
ACNS'11 Proceedings of the 9th international conference on Applied cryptography and network security
Faster secure two-party computation using garbled circuits
SEC'11 Proceedings of the 20th USENIX conference on Security
Double SP-functions: enhanced generalized feistel networks
ACISP'11 Proceedings of the 16th Australasian conference on Information security and privacy
Application-binding protocol in the user centric smart card ownership model
ACISP'11 Proceedings of the 16th Australasian conference on Information security and privacy
The PHOTON family of lightweight Hash functions
CRYPTO'11 Proceedings of the 31st annual conference on Advances in cryptology
Intelligent call setup strategy for multimedia communication in heterogeneous wireless network
Expert Systems with Applications: An International Journal
A lightweight 256-bit hash function for hardware and low-end devices: lesamnta-LW
ICISC'10 Proceedings of the 13th international conference on Information security and cryptology
Protecting white-box AES with dual ciphers
ICISC'10 Proceedings of the 13th international conference on Information security and cryptology
Generic side-channel countermeasures for reconfigurable devices
CHES'11 Proceedings of the 13th international conference on Cryptographic hardware and embedded systems
Meet-in-the-middle and impossible differential fault analysis on AES
CHES'11 Proceedings of the 13th international conference on Cryptographic hardware and embedded systems
A modular test platform for evaluation of security protocols in NFC applications
CMS'11 Proceedings of the 12th IFIP TC 6/TC 11 international conference on Communications and multimedia security
Wireless Personal Communications: An International Journal
MASHA: low cost authentication with a new stream cipher
ISC'11 Proceedings of the 14th international conference on Information security
On applications of singular matrices over finite fields in cryptography
InfoSecHiComNet'11 Proceedings of the First international conference on Security aspects in information technology
Fast software implementation of AES-CCM on multiprocessors
ICA3PP'11 Proceedings of the 11th international conference on Algorithms and architectures for parallel processing - Volume Part II
Experimental verification of super-sbox analysis: confirmation of detailed attack complexity
IWSEC'11 Proceedings of the 6th International conference on Advances in information and computer security
Security through amnesia: a software-based solution to the cold boot attack on disk encryption
Proceedings of the 27th Annual Computer Security Applications Conference
Trivium: a stream cipher construction inspired by block cipher design principles
ISC'06 Proceedings of the 9th international conference on Information Security
KFC - The Krazy Feistel Cipher
ASIACRYPT'06 Proceedings of the 12th international conference on Theory and Application of Cryptology and Information Security
Perfect diffusion primitives for block ciphers
SAC'04 Proceedings of the 11th international conference on Selected Areas in Cryptography
Cryptanalysis of a white box AES implementation
SAC'04 Proceedings of the 11th international conference on Selected Areas in Cryptography
Discrete logarithm variants of VSH
VIETCRYPT'06 Proceedings of the First international conference on Cryptology in Vietnam
Non-monopolizable caches: Low-complexity mitigation of cache side channel attacks
ACM Transactions on Architecture and Code Optimization (TACO) - HIPEAC Papers
Enciphering with arbitrary small finite domains
INDOCRYPT'06 Proceedings of the 7th international conference on Cryptology in India
AES software implementations on ARM7TDMI
INDOCRYPT'06 Proceedings of the 7th international conference on Cryptology in India
A New Specimen Management System Using RFID Technology
Journal of Medical Systems
Trace-driven cache attacks on AES (short paper)
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
An instruction set extension for fast and memory-efficient AES implementation
CMS'05 Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies
SEA: a scalable encryption algorithm for small embedded applications
CARDIS'06 Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
A related-key rectangle attack on the full KASUMI
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
A complete formulation of generalized affine equivalence
ICTCS'05 Proceedings of the 9th Italian conference on Theoretical Computer Science
New multiset attacks on rijndael with large blocks
Mycrypt'05 Proceedings of the 1st international conference on Progress in Cryptology in Malaysia
Side channel attacks on message authentication codes
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Functional correctness proofs of encryption algorithms
LPAR'05 Proceedings of the 12th international conference on Logic for Programming, Artificial Intelligence, and Reasoning
Small scale variants of the AES
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
A new distinguisher for clock controlled stream ciphers
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
How to enhance the security of the 3GPP confidentiality and integrity algorithms
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
Related-key rectangle attacks on reduced versions of SHACAL-1 and AES-192
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
Cache-collision timing attacks against AES
CHES'06 Proceedings of the 8th international conference on Cryptographic Hardware and Embedded Systems
NanoCMOS-molecular realization of rijndael
CHES'06 Proceedings of the 8th international conference on Cryptographic Hardware and Embedded Systems
New cryptographic applications of boolean function equivalence classes
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Usable optimistic fair exchange
Computer Networks: The International Journal of Computer and Telecommunications Networking
Related-Key impossible differential attacks on 8-round AES-192
CT-RSA'06 Proceedings of the 2006 The Cryptographers' Track at the RSA conference on Topics in Cryptology
Higher order masking of the AES
CT-RSA'06 Proceedings of the 2006 The Cryptographers' Track at the RSA conference on Topics in Cryptology
A new criterion for nonlinearity of block ciphers
CT-RSA'06 Proceedings of the 2006 The Cryptographers' Track at the RSA conference on Topics in Cryptology
Block ciphers sensitive to gröbner basis attacks
CT-RSA'06 Proceedings of the 2006 The Cryptographers' Track at the RSA conference on Topics in Cryptology
On feistel structures using a diffusion switching mechanism
FSE'06 Proceedings of the 13th international conference on Fast Software Encryption
Pseudorandom permutation families over abelian groups
FSE'06 Proceedings of the 13th international conference on Fast Software Encryption
Upper bounds on algebraic immunity of boolean power functions
FSE'06 Proceedings of the 13th international conference on Fast Software Encryption
Fault based collision attacks on AES
FDTC'06 Proceedings of the Third international conference on Fault Diagnosis and Tolerance in Cryptography
A comparative cost/security analysis of fault attack countermeasures
FDTC'06 Proceedings of the Third international conference on Fault Diagnosis and Tolerance in Cryptography
A cryptographic algorithm based on hybrid cubes
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part IV
Differential cryptanalysis of PP-1 cipher
Annales UMCS, Informatica - Cryptography and data protection
ECRYPT: the cryptographic research challenges for the next decade
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
A systematic evaluation of compact hardware implementations for the rijndael s-box
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
Cryptographics: secret key cryptography using graphics cards
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
Secure and efficient AES software implementation for smart cards
WISA'04 Proceedings of the 5th international conference on Information Security Applications
The cryptanalysis of the AES – a brief survey
AES'04 Proceedings of the 4th international conference on Advanced Encryption Standard
The boomerang attack on 5 and 6-round reduced AES
AES'04 Proceedings of the 4th international conference on Advanced Encryption Standard
A three rounds property of the AES
AES'04 Proceedings of the 4th international conference on Advanced Encryption Standard
AES'04 Proceedings of the 4th international conference on Advanced Encryption Standard
Refined analysis of bounds related to linear and differential cryptanalysis for the AES
AES'04 Proceedings of the 4th international conference on Advanced Encryption Standard
Some algebraic aspects of the advanced encryption standard
AES'04 Proceedings of the 4th international conference on Advanced Encryption Standard
General principles of algebraic attacks and new design criteria for cipher components
AES'04 Proceedings of the 4th international conference on Advanced Encryption Standard
An algebraic interpretation of AES-128
AES'04 Proceedings of the 4th international conference on Advanced Encryption Standard
Efficient AES implementations on ASICs and FPGAs
AES'04 Proceedings of the 4th international conference on Advanced Encryption Standard
Small size, low power, side channel-immune AES coprocessor: design and synthesis results
AES'04 Proceedings of the 4th international conference on Advanced Encryption Standard
Linearity of the AES key schedule
AES'04 Proceedings of the 4th international conference on Advanced Encryption Standard
The inverse s-box, non-linear polynomial relations and cryptanalysis of block ciphers
AES'04 Proceedings of the 4th international conference on Advanced Encryption Standard
On evaluating the performance of security protocols
PaCT'05 Proceedings of the 8th international conference on Parallel Computing Technologies
Related-Key boomerang and rectangle attacks
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Secure AES hardware module for resource constrained devices
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
All in the XL family: theory and practice
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
A secure distance-based RFID identification protocol with an off-line back-end database
Personal and Ubiquitous Computing
Key recovery attacks of practical complexity on AES-256 variants with up to 10 rounds
EUROCRYPT'10 Proceedings of the 29th Annual international conference on Theory and Applications of Cryptographic Techniques
EUROCRYPT'10 Proceedings of the 29th Annual international conference on Theory and Applications of Cryptographic Techniques
Area, delay, and power characteristics of standard-cell implementations of the AES s-box
SAMOS'06 Proceedings of the 6th international conference on Embedded Computer Systems: architectures, Modeling, and Simulation
Improved rijndael-like s-box and its transform domain analysis
SETA'06 Proceedings of the 4th international conference on Sequences and Their Applications
Understanding two-round differentials in AES
SCN'06 Proceedings of the 5th international conference on Security and Cryptography for Networks
High diffusion cipher: encryption and error correction in a single cryptographic primitive
ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
The design and implementation of secure socket SCTP
Transactions on Computational Science VI
Compression of encrypted visual data
CMS'06 Proceedings of the 10th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
Cache based remote timing attack on the AES
CT-RSA'07 Proceedings of the 7th Cryptographers' track at the RSA conference on Topics in Cryptology
Security threat mitigation trends in low-cost RFID systems
DPM'09/SETOP'09 Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security
Differential cache-collision timing attacks on AES with applications to embedded CPUs
CT-RSA'10 Proceedings of the 2010 international conference on Topics in Cryptology
Usable optimistic fair exchange
CT-RSA'10 Proceedings of the 2010 international conference on Topics in Cryptology
Linear cryptanalysis of reduced-round PRESENT
CT-RSA'10 Proceedings of the 2010 international conference on Topics in Cryptology
MoteAODV – an AODV implementation for TinyOS 2.0
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
An algebraic framework for cipher embeddings
IMA'05 Proceedings of the 10th international conference on Cryptography and Coding
CCMEA: customized cellular message encryption algorithm for wireless networks
ICISS'05 Proceedings of the First international conference on Information Systems Security
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
Proving the security of AES substitution-permutation network
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
The provable constructive effect of diffusion switching mechanism in CLEFIA-type block ciphers
Information Processing Letters
Implementing minimized multivariate PKC on low-resource embedded systems
SPC'06 Proceedings of the Third international conference on Security in Pervasive Computing
An algebraic masking method to protect AES against power attacks
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
An FPGA implementation of CCM mode using AES
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
Biclique cryptanalysis of the full AES
ASIACRYPT'11 Proceedings of the 17th international conference on The Theory and Application of Cryptology and Information Security
Attacks on simplified versions of k2
SIIS'11 Proceedings of the 2011 international conference on Security and Intelligent Information Systems
Secure mashup-providing platforms - implementing encrypted wiring
ICWE'11 Proceedings of the 11th international conference on Current Trends in Web Engineering
Order-Preserving encryption for non-uniformly distributed plaintexts
WISA'11 Proceedings of the 12th international conference on Information Security Applications
Very compact hardware implementations of the blockcipher CLEFIA
SAC'11 Proceedings of the 18th international conference on Selected Areas in Cryptography
KLEIN: a new family of lightweight block ciphers
RFIDSec'11 Proceedings of the 7th international conference on RFID Security and Privacy
RFIDSec'11 Proceedings of the 7th international conference on RFID Security and Privacy
Compact FPGA implementations of the five SHA-3 finalists
CARDIS'11 Proceedings of the 10th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
On permutation layer of type 1, source-heavy, and target-heavy generalized feistel structures
CANS'11 Proceedings of the 10th international conference on Cryptology and Network Security
INDOCRYPT'11 Proceedings of the 12th international conference on Cryptology in India
LOT: A Defense Against IP Spoofing and Flooding Attacks
ACM Transactions on Information and System Security (TISSEC)
Robust track-and-trace video watermarking
Security and Communication Networks
Impossible differential attacks on reduced-round LBlock
ISPEC'12 Proceedings of the 8th international conference on Information Security Practice and Experience
Linear cryptanalysis of reduced-round ICEBERG
ISPEC'12 Proceedings of the 8th international conference on Information Security Practice and Experience
EUROCRYPT'12 Proceedings of the 31st Annual international conference on Theory and Applications of Cryptographic Techniques
Energy efficiency of encryption schemes applied to wireless sensor networks
Security and Communication Networks
Secure and efficient dynamic program update in wireless sensor networks
Security and Communication Networks
A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
Journal of Network and Computer Applications
Security model for emergency real-time communications in autonomous networks
Information Systems Frontiers
On construction of involutory MDS matrices from Vandermonde Matrices in GF(2q)
Designs, Codes and Cryptography
PICARO: a block cipher allowing efficient higher-order side-channel resistance
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
Verification of restricted EA-equivalence for vectorial boolean functions
WAIFI'12 Proceedings of the 4th international conference on Arithmetic of Finite Fields
Differential cryptanalysis of reduced-round ICEBERG
AFRICACRYPT'12 Proceedings of the 5th international conference on Cryptology in Africa
Compact implementation and performance evaluation of block ciphers in ATtiny devices
AFRICACRYPT'12 Proceedings of the 5th international conference on Cryptology in Africa
SPN-hash: improving the provable resistance against differential collision attacks
AFRICACRYPT'12 Proceedings of the 5th international conference on Cryptology in Africa
Length-preserving bit-stream-based JPEG encryption
Proceedings of the on Multimedia and security
Gone in 360 seconds: Hijacking with Hitag2
Security'12 Proceedings of the 21st USENIX conference on Security symposium
Improved integral analysis on tweaked lesamnta
ICISC'11 Proceedings of the 14th international conference on Information Security and Cryptology
Aligot: cryptographic function identification in obfuscated binary programs
Proceedings of the 2012 ACM conference on Computer and communications security
VEACON: A Vehicular Accident Ontology designed to improve safety on the roads
Journal of Network and Computer Applications
Cryptanalysis of the Full AES Using GPU-Like Special-Purpose Hardware
Fundamenta Informaticae - Cryptology in Progress: 10th Central European Conference on Cryptology, Będlewo Poland, 2010
Evaluating the energy-efficiency of key exchange protocols in wirelesssensor networks
Proceedings of the 7th ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks
The 128-bit blockcipher CLEFIA
FSE'07 Proceedings of the 14th international conference on Fast Software Encryption
FSE'07 Proceedings of the 14th international conference on Fast Software Encryption
Related-key rectangle attacks on reduced AES-192 and AES-256
FSE'07 Proceedings of the 14th international conference on Fast Software Encryption
Impossible-differential attacks on large-block Rijndael
ISC'07 Proceedings of the 10th international conference on Information Security
Differential properties of elliptic curves and blind signatures
ISC'07 Proceedings of the 10th international conference on Information Security
Power efficiency evaluation of block ciphers on GPU-integrated multicore processor
ICA3PP'12 Proceedings of the 12th international conference on Algorithms and Architectures for Parallel Processing - Volume Part I
"Provable" security against differential and linear cryptanalysis
FSE'12 Proceedings of the 19th international conference on Fast Software Encryption
Zero correlation linear cryptanalysis with reduced data complexity
FSE'12 Proceedings of the 19th international conference on Fast Software Encryption
On the (in)security of IDEA in various hashing modes
FSE'12 Proceedings of the 19th international conference on Fast Software Encryption
UNAF: a special set of additive differences with application to the differential analysis of ARX
FSE'12 Proceedings of the 19th international conference on Fast Software Encryption
Lapin: an efficient authentication protocol based on Ring-LPN
FSE'12 Proceedings of the 19th international conference on Fast Software Encryption
Recursive diffusion layers for block ciphers and hash functions
FSE'12 Proceedings of the 19th international conference on Fast Software Encryption
Differential propagation analysis of keccak
FSE'12 Proceedings of the 19th international conference on Fast Software Encryption
An investigation of ensemble systems applied to encrypted and cancellable biometric data
ICANN'12 Proceedings of the 22nd international conference on Artificial Neural Networks and Machine Learning - Volume Part II
Simple photonic emission analysis of AES: photonic side channel analysis for the rest of us
CHES'12 Proceedings of the 14th international conference on Cryptographic Hardware and Embedded Systems
Towards green cryptography: a comparison of lightweight ciphers from the energy viewpoint
CHES'12 Proceedings of the 14th international conference on Cryptographic Hardware and Embedded Systems
Low-latency encryption: is "Lightweight = light + wait"?
CHES'12 Proceedings of the 14th international conference on Cryptographic Hardware and Embedded Systems
Secure data transmission with cloud computing in heterogeneous wireless networks
Security and Communication Networks
Searching short recurrences of nonlinear shift registers via directed acyclic graphs
Inscrypt'11 Proceedings of the 7th international conference on Information Security and Cryptology
Differential and linear cryptanalysis using mixed-integer linear programming
Inscrypt'11 Proceedings of the 7th international conference on Information Security and Cryptology
Cryptanalysis of reduced-round KLEIN block cipher
Inscrypt'11 Proceedings of the 7th international conference on Information Security and Cryptology
The schedulability of AES as a countermeasure against side channel attacks
SPACE'12 Proceedings of the Second international conference on Security, Privacy, and Applied Cryptography Engineering
Secure distributed storage for bulk data
ICONIP'12 Proceedings of the 19th international conference on Neural Information Processing - Volume Part V
Coopetitive architecture to support a dynamic and scalable NFC based mobile services architecture
ICICS'12 Proceedings of the 14th international conference on Information and Communications Security
Generalization of Matsui's Algorithm 1 to linear hull for key-alternating block ciphers
Designs, Codes and Cryptography
Generalized Feistel networks revisited
Designs, Codes and Cryptography
SMSCrypto: A lightweight cryptographic framework for secure SMS transmission
Journal of Systems and Software
Differential analysis of the LED block cipher
ASIACRYPT'12 Proceedings of the 18th international conference on The Theory and Application of Cryptology and Information Security
Generic related-key attacks for HMAC
ASIACRYPT'12 Proceedings of the 18th international conference on The Theory and Application of Cryptology and Information Security
Shuffling against side-channel attacks: a comprehensive study with cautionary note
ASIACRYPT'12 Proceedings of the 18th international conference on The Theory and Application of Cryptology and Information Security
An innovative electronic group-buying system for mobile commerce
Electronic Commerce Research and Applications
The M4RIE library for dense linear algebra over small fields with even characteristic
Proceedings of the 37th International Symposium on Symbolic and Algebraic Computation
Security-aware optimization for ubiquitous computing systems with SEAT graph approach
Journal of Computer and System Sciences
Compact implementation and performance evaluation of hash functions in ATtiny devices
CARDIS'12 Proceedings of the 11th international conference on Smart Card Research and Advanced Applications
Mobile Networks and Applications
Cryptanalysis of the Stream Cipher LEX
Designs, Codes and Cryptography
Partial encryption and watermarking scheme for audio files with controlled degradation of quality
Multimedia Tools and Applications
Improved impossible differential attacks on large-block rijndael
ICISC'12 Proceedings of the 15th international conference on Information Security and Cryptology
ICISC'12 Proceedings of the 15th international conference on Information Security and Cryptology
Weak leakage-resilient client-side deduplication of encrypted data in cloud storage
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
ACM Transactions on Information and System Security (TISSEC)
A conditional access system with efficient key distribution and revocation for mobile pay-TV systems
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Chaos-based partial encryption of SPIHT coded color images
Signal Processing
DATE '12 Proceedings of the Conference on Design, Automation and Test in Europe
Revealing side-channel issues of complex circuits by enhanced leakage models
DATE '12 Proceedings of the Conference on Design, Automation and Test in Europe
Hardware Cost Measurement of Lightweight Security Protocols
Wireless Personal Communications: An International Journal
TSV: A novel energy efficient Memory Integrity Verification scheme for embedded systems
Journal of Systems Architecture: the EUROMICRO Journal
MrCrypt: static analysis for secure cloud computations
Proceedings of the 2013 ACM SIGPLAN international conference on Object oriented programming systems languages & applications
Low-power compact composite field AES S-Box/Inv S-Box design in 65nm CMOS using Novel XOR Gate
Integration, the VLSI Journal
Single password authentication
Computer Networks: The International Journal of Computer and Telecommunications Networking
ACM Transactions on Embedded Computing Systems (TECS) - Special issue on application-specific processors
Securing ZigBee smart energy profile 1.x with OpenECC library
Proceedings of the first ACM workshop on Smart energy grid security
Attacks on implementations of cryptographic algorithms: side-channel and fault attacks
Proceedings of the 6th International Conference on Security of Information and Networks
Preimage attacks on Feistel-SP functions: impact of omitting the last network twist
ACNS'13 Proceedings of the 11th international conference on Applied Cryptography and Network Security
Secure and efficient design of software block cipher implementations on microcontrollers
International Journal of Grid and Utility Computing
Light-weight primitive, feather-weight security: a cryptanalytic knock-out
Proceedings of the Workshop on Embedded Systems Security
Differential photonic emission analysis
COSADE'13 Proceedings of the 4th international conference on Constructive Side-Channel Analysis and Secure Design
Chosen-IV correlation power analysis on KCipher-2 and a countermeasure
COSADE'13 Proceedings of the 4th international conference on Constructive Side-Channel Analysis and Secure Design
Semi-Supervised template attack
COSADE'13 Proceedings of the 4th international conference on Constructive Side-Channel Analysis and Secure Design
CHES'13 Proceedings of the 15th international conference on Cryptographic Hardware and Embedded Systems
FIDES: lightweight authenticated cipher with side-channel resistance for constrained hardware
CHES'13 Proceedings of the 15th international conference on Cryptographic Hardware and Embedded Systems
A new tool for sharing and querying of clinical documents modeled using HL7 Version 3 standard
Computer Methods and Programs in Biomedicine
Candidate weak pseudorandom functions in AC0 ○ MOD2
Proceedings of the 5th conference on Innovations in theoretical computer science
Cross-layer analysis of protocol delay in mobile devices receiving BCMCS
Wireless Networks
A new compression scheme for secure transmission
International Journal of Automation and Computing
On the algebraic construction of cryptographically good 32×32 binary linear transformations
Journal of Computational and Applied Mathematics
On computational complexity of impossible differential cryptanalysis
Information Processing Letters
Linear hulls with correlation zero and linear cryptanalysis of block ciphers
Designs, Codes and Cryptography
Information-Knowledge-Systems Management
Information-Knowledge-Systems Management
Hi-index | 0.20 |
From the Publisher:In October 2000, the US National Institute of Standards and Technology selected the block cipher Rijndael as the Advanced Encryption Standard (AES). AES is expected to gradually replace the present Data Encryption Standard (DES) as the most widely applied data encryption technology.|This book by the designers of the block cipher presents Rijndael from scratch. The underlying mathematics and the wide trail strategy as the basic design idea are explained in detail and the basics of differential and linear cryptanalysis are reworked. Subsequent chapters review all known attacks against the Rijndael structure and deal with implementation and optimization issues. Finally, other ciphers related to Rijndael are presented.|This volume is THE authoritative guide to the Rijndael algorithm and AES. Professionals, researchers, and students active or interested in data encryption will find it a valuable source of information and reference.