-
2
-
-
79957587246
-
Tradeoffs in parallel and serial implementations of the international data encryption algorithm
-
Lecture Notes in Computer Science, (Springer)
-
O.Y.H. Cheung, K.H. Tsoi, P.H.W. Leong and M.P. Leong, Tradeoffs in parallel and serial implementations of the international data encryption algorithm, in: Proceedings of CHES 2001, Lecture Notes in Computer Science, Vol. 2162 (Springer, 2001) pp. 333-337.
-
(2001)
Proceedings of CHES 2001
, vol.2162
, pp. 333-337
-
-
Cheung, O.Y.H.1
Tsoi, K.H.2
Leong, P.H.W.3
Leong, M.P.4
-
3
-
-
84944260529
-
A study of nonlocking switching networks
-
C. Clos, A study of nonlocking switching networks, Bell System Technical J. 32 (1953) 406-424.
-
(1953)
Bell System Technical J.
, vol.32
, pp. 406-424
-
-
Clos, C.1
-
4
-
-
17444423868
-
VLSI architecture and FPGA implementation of ICE encryption algorithm
-
United Arab Emirates, December 14-17
-
A.P. Fournaris, N. Sklavos and O. Koufopavlou, VLSI architecture and FPGA implementation of ICE encryption algorithm, in: Proceedings of 10th IEEE International Conference on Electronics, Circuits and Systems (ICECS'03), United Arab Emirates, December 14-17 (2003).
-
(2003)
Proceedings of 10th IEEE International Conference on Electronics, Circuits and Systems (ICECS'03)
-
-
Fournaris, A.P.1
Sklavos, N.2
Koufopavlou, O.3
-
5
-
-
4344574503
-
-
A-LIST Publishing, Wayne
-
N.D. Goots, B.V. Izotov, A.A. Moldovyan and N.A. Moldovyan, Modern Cryptography: Protect Your Data with Fast Block Ciphers (A-LIST Publishing, Wayne, 2003) 400 p., http://www.alistpublishing.com
-
(2003)
Modern Cryptography: Protect Your Data with Fast Block Ciphers
, pp. 400
-
-
Goots, N.D.1
Izotov, B.V.2
Moldovyan, A.A.3
Moldovyan, N.A.4
-
6
-
-
84955566245
-
Fast encryption algorithm SPECTR-H64
-
Lecture Notes in Computer Science, (Springer)
-
N.D. Goots, A.A. Moldovyan and N.A. Moldovyan, Fast encryption algorithm SPECTR-H64, in: Proceedings of the International Workshop, Methods, Models, and Architectures for Network Security 2001, Lecture Notes in Computer Science, Vol. 2052 (Springer, 2001) pp. 275-286.
-
(2001)
Proceedings of the International Workshop, Methods, Models, and Architectures for Network Security 2001
, vol.2052
, pp. 275-286
-
-
Goots, N.D.1
Moldovyan, A.A.2
Moldovyan, N.A.3
-
7
-
-
84937060688
-
Hardware implementation of the improved WEP and RC4 encryption algorithms for wireless terminals
-
September 5-8, Finland
-
P. Hamalainen, M. Hannikainen, T. Hamalainen and J. Saarinen, Hardware implementation of the improved WEP and RC4 encryption algorithms for wireless terminals, in: Proceedings of the European Signal Processing Conference (EUSIPCO'2000), September 5-8, Finland (2000).
-
(2000)
Proceedings of the European Signal Processing Conference (EUSIPCO'2000)
-
-
Hamalainen, P.1
Hannikainen, M.2
Hamalainen, T.3
Saarinen, J.4
-
9
-
-
3042720550
-
Hardware implementation of the Bluetooth security
-
P. Kitsos, N. Sklavos, K. Papadomanolakis and O. Koufopavlou, Hardware implementation of the Bluetooth security, IEEE Pervasive Computing, Mobile and Ubiquitous Systems 2(1) (2003) 21-29.
-
(2003)
IEEE Pervasive Computing, Mobile and Ubiquitous Systems
, vol.2
, Issue.1
, pp. 21-29
-
-
Kitsos, P.1
Sklavos, N.2
Papadomanolakis, K.3
Koufopavlou, O.4
-
10
-
-
33646847104
-
Linear cryptanalysis on SPECTR-H64 with higher order differential property
-
Lecture Notes in Computer Science, (Springer, Berlin)
-
Y. Ko, D. Hong, S. Hong, S. Lee and J. Lim, Linear cryptanalysis on SPECTR-H64 with higher order differential property, in: Proceedings of International Workshop, Methods, Models, and Architectures for Network Security 2003, Lecture Notes in Computer Science, Vol. 2776 (Springer, Berlin, 2003) pp. 298-307.
-
(2003)
Proceedings of International Workshop, Methods, Models, and Architectures for Network Security 2003
, vol.2776
, pp. 298-307
-
-
Ko, Y.1
Hong, D.2
Hong, S.3
Lee, S.4
Lim, J.5
-
11
-
-
84944063721
-
A chosen plain-text linear attack on block cipher CIKS-1
-
Springer
-
C. Lee, D. Hong, S. Lee, S. Lee, H. Yang and J. Lim, A chosen plain-text linear attack on block cipher CIKS-1, Lecture Notes in Computer Science, Vol. 2513 (Springer, 2002) pp. 456-468.
-
(2002)
Lecture Notes in Computer Science
, vol.2513
, pp. 456-468
-
-
Lee, C.1
Hong, D.2
Lee, S.3
Lee, S.4
Yang, H.5
Lim, J.6
-
12
-
-
17444393424
-
-
A method of the block encryption of discrete data, Russian patent # 2140710, Bull. No. 30
-
V.M. Maslovsky, A.A. Moldovyan and N.A. Moldovyan, A method of the block encryption of discrete data, Russian patent # 2140710, Bull. No. 30 (1999).
-
(1999)
-
-
Maslovsky, V.M.1
Moldovyan, A.A.2
Moldovyan, N.A.3
-
13
-
-
84944878412
-
High performance single-chip FPGA Rijndael algorithm implementation
-
Lecture Notes in Computer Science, Springer
-
M. McLoone and J.V. McCanny, High performance single-chip FPGA Rijndael algorithm implementation, in: Proceedings of CHES 2001, Lecture Notes in Computer Science, Vol. 2162 (Springer, 2001) pp. 65-76.
-
(2001)
Proceedings of CHES 2001
, vol.2162
, pp. 65-76
-
-
McLoone, M.1
McCanny, J.V.2
-
14
-
-
84983066987
-
Fast block ciphers based on controlled permutations
-
A.A. Moldovyan, Fast block ciphers based on controlled permutations, Computer Science Journal of Moldova 8(3) (2000) 270-283.
-
(2000)
Computer Science Journal of Moldova
, vol.8
, Issue.3
, pp. 270-283
-
-
Moldovyan, A.A.1
-
15
-
-
17444369596
-
-
A method of the cryptographical transformation of binary data blocks, Russian patent # 2141729, Bull. No. 32
-
A.A. Moldovyan and N.A. Moldovyan, A method of the cryptographical transformation of binary data blocks, Russian patent # 2141729, Bull. No. 32 (1999).
-
(1999)
-
-
Moldovyan, A.A.1
Moldovyan, N.A.2
-
16
-
-
0141755484
-
A cipher based on data-dependent permutations
-
A.A. Moldovyan and N.A. Moldovyan, A cipher based on data-dependent permutations, Journal of Cryptology 15(1) (2002) 61-72.
-
(2002)
Journal of Cryptology
, vol.15
, Issue.1
, pp. 61-72
-
-
Moldovyan, A.A.1
Moldovyan, N.A.2
-
17
-
-
17444431022
-
A generalized description of DES-based and benes-based permutation generators
-
Lecture Notes in Computer Science, (Springer)
-
M. Portz, A generalized description of DES-based and benes-based permutation generators, in: Advances in Criptology, Lecture Notes in Computer Science, Vol. 718 (Springer, 1992) pp. 397-409.
-
(1992)
Advances in Criptology
, vol.718
, pp. 397-409
-
-
Portz, M.1
-
18
-
-
78649457965
-
-
May 24
-
B. Preneel, A. Bosselaers, V. Rijmen, B. Van Rompay, L. Granboulan, J. Stern, S. Murphy, M. Dichtl, P. Serf, E. Biham, O. Dunkelman, V. Furman, F. Koeune, G. Piret, J.-J. Quisquater, L. Knudsen and H. Raddum, Comments by the NESSIE project on the AES finalists, May 24 (2000), http://www.nist.gav/aes
-
(2000)
Comments by the NESSIE Project on the AES Finalists
-
-
Preneel, B.1
Bosselaers, A.2
Rijmen, V.3
Van Rompay, B.4
Granboulan, L.5
Stern, J.6
Murphy, S.7
Dichtl, M.8
Serf, P.9
Biham, E.10
Dunkelman, O.11
Furman, V.12
Koeune, F.13
Piret, G.14
Quisquater, J.-J.15
Knudsen, L.16
Raddum, H.17
-
19
-
-
84940569897
-
Efficient VLSI implementation of modern symmetric block ciphers
-
Cyprus
-
A. Schubert and W. Anheier, Efficient VLSI implementation of modern symmetric block ciphers, in: Proceedings of ICECS'99, Cyprus (1999).
-
(1999)
Proceedings of ICECS'99
-
-
Schubert, A.1
Anheier, W.2
-
20
-
-
84947907850
-
Differential cryptanaly sis of the ICE encryption algorithm
-
Lecture Notes in Computer Science, Springer
-
B. Van Rompay, L.R. Knudsen and V. Rijmen, Differential cryptanaly sis of the ICE encryption algorithm, in: Proceedings of the 6th International Workshop Fast Software Encryption - FSE'98, Lecture Notes in Computer Science, Vol. 1372 (Springer, 1998) pp. 270-283.
-
(1998)
Proceedings of the 6th International Workshop Fast Software Encryption - FSE'98
, vol.1372
, pp. 270-283
-
-
Van Rompay, B.1
Knudsen, L.R.2
Rijmen, V.3
-
21
-
-
0003656468
-
Hardware performance simulations of round 2 advanced encryption standard algorithms
-
New York, USA, April 13-14
-
B. Weeks, M. Bean, T. Rozylowicz and C. Ficke, Hardware performance simulations of round 2 advanced encryption standard algorithms, in: Proceedings of 3rd Advanced Encryption Standard (AES) Candidate Conference, New York, USA, April 13-14 (2000).
-
(2000)
Proceedings of 3rd Advanced Encryption Standard (AES) Candidate Conference
-
-
Weeks, B.1
Bean, M.2
Rozylowicz, T.3
Ficke, C.4
-
22
-
-
84949491507
-
A DES ASIC suitable for network encryption at 10 Gbps and beyoned
-
Lecture Notes in Computer Science, (Springer)
-
D.C. Wilcox, L.G. Pierson, P.J. Roberston, E.L. Witzke and K. Gass, A DES ASIC suitable for network encryption at 10 Gbps and beyoned, in: Proceedings of CHES'99, Lecture Notes in Computer Science, Vol. 1717 (Springer, 1999) pp. 37-48.
-
(1999)
Proceedings of CHES'99
, vol.1717
, pp. 37-48
-
-
Wilcox, D.C.1
Pierson, L.G.2
Roberston, P.J.3
Witzke, E.L.4
Gass, K.5
-
23
-
-
0028384266
-
A 177 Mb/s VLSI implementation of the international data encryption algorithm
-
R. Zimmermann, A. diriger, H. Bonnenberg, H. Kaeslin, N. Felber and W. Fichtner, A 177 Mb/s VLSI implementation of the international data encryption algorithm, IEEE Journal of Solid State Circuits 29(3) (1994) 303-307.
-
(1994)
IEEE Journal of Solid State Circuits
, vol.29
, Issue.3
, pp. 303-307
-
-
Zimmermann, R.1
Diriger, A.2
Bonnenberg, H.3
Kaeslin, H.4
Felber, N.5
Fichtner, W.6
|