Protocol implementation using integrated layer processing
SIGCOMM '95 Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
Performance evaluation and cache analysis of an ILP protocol implementation
IEEE/ACM Transactions on Networking (TON)
Constructing Symmetric Ciphers Using the CAST Design Procedure
Designs, Codes and Cryptography - Special issue: selected areas in cryptography I
Low power scalable encryption for wireless systems
Wireless Networks - Special issue VLSI in wireless networks
A tentative approach to constructing tamper-resistant software
NSPW '97 Proceedings of the 1997 workshop on New security paradigms
Linear Frameworks for Block Ciphers
Designs, Codes and Cryptography
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
On Some Cryptographic Properties of Rijndael
MMM-ACNS '01 Proceedings of the International Workshop on Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security
Fast Multimedia Encryption in JAVA: Using Unbalanced Luby/Rackoff Ciphers
ECMAST '99 Proceedings of the 4th European Conference on Multimedia Applications, Services and Techniques
A Key-schedule Weakness in SAFER K-64
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Key-Schedule Cryptoanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
On Differential Properties of Pseudo-Hadamard Transform and Related Mappings
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
Improved Truncated Differential Attacks on SAFER
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998
Recent Developments in the Design of Conventional Cryptographic Algorithms
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
FSE '99 Proceedings of the 6th International Workshop on Fast Software Encryption
Linear Cryptanalysis of Reduced-Round Versions of the SAFER Block Cipher Family
FSE '00 Proceedings of the 7th International Workshop on Fast Software Encryption
FSE '02 Revised Papers from the 9th International Workshop on Fast Software Encryption
IDEA: A Cipher For Multimedia Architectures?
SAC '98 Proceedings of the Selected Areas in Cryptography
FSE '98 Proceedings of the 5th International Workshop on Fast Software Encryption
Rotation symmetry in algebraically generated cryptographic substitution tables
Information Processing Letters
Design of secure hardware for ATM networks
TELE-INFO'05 Proceedings of the 4th WSEAS International Conference on Telecommunications and Informatics
Note: APN permutations on Zn and Costas arrays
Discrete Applied Mathematics
A new impossible differential attack on SAFER ciphers
Computers and Electrical Engineering
A generalization of linear cryptanalysis and the applicability of Matsui's piling-up lemma
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
XOR and non-XOR differential probabilities
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Dial C for cipher: le chiffrement était presque parfait
SAC'06 Proceedings of the 13th international conference on Selected areas in cryptography
Linear cryptanalysis of non binary ciphers
SAC'07 Proceedings of the 14th international conference on Selected areas in cryptography
JEA K-128: a novel encryption algorithm using VHDL
WSEAS Transactions on Computers
On the nonlinearity of exponential welch costas functions
IEEE Transactions on Information Theory
An on-line signal encryption method
ICCOM'06 Proceedings of the 10th WSEAS international conference on Communications
The ANF of the composition of addition and multiplication mod 2n
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
Ambiguity and deficiency in costas arrays and APN permutations
LATIN'10 Proceedings of the 9th Latin American conference on Theoretical Informatics
An algebraic framework for cipher embeddings
IMA'05 Proceedings of the 10th international conference on Cryptography and Coding
Note: Permutation polynomials and their differential properties over residue class rings
Discrete Applied Mathematics
Hi-index | 0.06 |