-
1
-
-
84946832086
-
A Compact Rijndael Hardware Architecture with S-Box Optimization
-
Boyd, C ed, ASIACRYPT 2001, Springer, Heidelberg
-
Satoh, K.T.A., Morioka, S., Munetoh, S.: A Compact Rijndael Hardware Architecture with S-Box Optimization. In: Boyd, C (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 239-254. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2248
, pp. 239-254
-
-
Satoh, K.T.A.1
Morioka, S.2
Munetoh, S.3
-
2
-
-
84955588617
-
How to Strengthen DES Using Existing Hardware
-
Safavi-Naini, R, Pieprzyk, J.P, eds, ASIACRYPT 1994, Springer, Heidelberg , available for download at
-
Biham, Biryukov,: How to Strengthen DES Using Existing Hardware. In: Safavi-Naini, R., Pieprzyk, J.P. (eds.) ASIACRYPT 1994. LNCS, vol. 917, Springer, Heidelberg (1995), available for download at citeseer.ist.psu.edu/ bihan94hov.html
-
(1995)
LNCS
, vol.917
-
-
Biham, B.1
-
3
-
-
0005351920
-
An Improvement of Davies' Attack on DES
-
available for download at
-
Biham, E., Biryukov, A.: An Improvement of Davies' Attack on DES. Journal of Cryptology: the journal of the International Association for Cryptologic Research 10(3), 195-205 (1997), available for download at citeseer.ist.psu.edu/ 467934.html
-
(1997)
Journal of Cryptology: The journal of the International Association for Cryptologic Research
, vol.10
, Issue.3
, pp. 195-205
-
-
Biham, E.1
Biryukov, A.2
-
4
-
-
84903595110
-
Differential Cryptanalysis of DES-like Cryptosystems
-
Menezes, A.J, Vanstone, S.A, eds, CRYPTO 1990, Springer, Heidelberg
-
Biham, E., Shamir, A.: Differential Cryptanalysis of DES-like Cryptosystems. In: Menezes, A.J., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 2-21. Springer, Heidelberg (1991)
-
(1991)
LNCS
, vol.537
, pp. 2-21
-
-
Biham, E.1
Shamir, A.2
-
5
-
-
84957677472
-
Differential Cryptanalysis of the Full 16-Round DES
-
Brickell, E.F, ed, CRYPTO 1992, Springer, Heidelberg , available for download at
-
Biham, E., Shamir, A.: Differential Cryptanalysis of the Full 16-Round DES. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 487-496. Springer, Heidelberg (1993), available for download at citeseer.ist.psu.edu/ biham93differential.html
-
(1993)
LNCS
, vol.740
, pp. 487-496
-
-
Biham, E.1
Shamir, A.2
-
6
-
-
35248868417
-
The Data Encryption Standard (DES) and its Strength Against Attacks
-
186131994, IBM Thomas J. Watson Research Center December
-
Coppersmith, D.: The Data Encryption Standard (DES) and its Strength Against Attacks. Technical report rc 186131994, IBM Thomas J. Watson Research Center (December 1994)
-
(1994)
Technical report rc
-
-
Coppersmith, D.1
-
7
-
-
0029632042
-
Pairs and Triplets of DES S-Boxes
-
Davies, D., Murphy, S.: Pairs and Triplets of DES S-Boxes. Journal of Cryptology 8(1), 1-25 (1995)
-
(1995)
Journal of Cryptology
, vol.8
, Issue.1
, pp. 1-25
-
-
Davies, D.1
Murphy, S.2
-
9
-
-
35048859848
-
-
Feldhofer, M., Dominikus, S., Wolkerstorfer, J.: Strong Authentication for RFID Systems. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, 3156, pp. 357-370. Springer, Heidelberg (2004)
-
Feldhofer, M., Dominikus, S., Wolkerstorfer, J.: Strong Authentication for RFID Systems. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 357-370. Springer, Heidelberg (2004)
-
-
-
-
11
-
-
33746739905
-
AES Implementation on a Grain of Sand. Information Security
-
Feldhofer, M., Wolkerstorfer, J., Rijmen, V.: AES Implementation on a Grain of Sand. Information Security, IEE Proceedings 152(1), 13-20 (2005)
-
(2005)
IEE Proceedings
, vol.152
, Issue.1
, pp. 13-20
-
-
Feldhofer, M.1
Wolkerstorfer, J.2
Rijmen, V.3
-
12
-
-
38149040743
-
Hardware Results for selected Stream Cipher Candidates. State of the Art of Stream Ciphers 2007 (SASC 2007)
-
Good, T., Benaissa, M.: Hardware Results for selected Stream Cipher Candidates. State of the Art of Stream Ciphers 2007 (SASC 2007), Workshop Record (February 2007)
-
(2007)
Workshop Record (February
-
-
Good, T.1
Benaissa, M.2
-
13
-
-
33750699594
-
-
Hong, D., Sung, J., Hong, S., Lim, J., Lee, S., Koo, B.-S., Lee, C., Chang, D., Lee, J., Jeong, K., Kim, H., Kim, J., Chee, S.: HIGHT: A New Block Cipher Suitable for Low-Resource Device. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, 4249, pp. 46-59. Springer, Heidelberg (2006)
-
Hong, D., Sung, J., Hong, S., Lim, J., Lee, S., Koo, B.-S., Lee, C., Chang, D., Lee, J., Jeong, K., Kim, H., Kim, J., Chee, S.: HIGHT: A New Block Cipher Suitable for Low-Resource Device. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 46-59. Springer, Heidelberg (2006)
-
-
-
-
14
-
-
34548846792
-
DES Can Be Immune to Linear Cryptanalysis
-
May, available for download at
-
Kim, K., Lee, S., Park, S., Lee, D.: DES Can Be Immune to Linear Cryptanalysis. In: Proceedings of the Workshop on Selected Areas in Cryptography SAC'94, pp. 70-81 (May 1994), available for download at citeseer.csail.mit.edu/ kim94des.html
-
(1994)
Proceedings of the Workshop on Selected Areas in Cryptography SAC'94
, pp. 70-81
-
-
Kim, K.1
Lee, S.2
Park, S.3
Lee, D.4
-
15
-
-
33845435887
-
Securing DES S-boxes Against Three Robust Cryptanalysis
-
available for download at
-
Kim, K., Lee, S., Park, S., Lee, D.: Securing DES S-boxes Against Three Robust Cryptanalysis. In: Proceedings of the Workshop on Selected Areas in Cryptography SAC'95, pp. 145-157 (1995), available for download at citeseer.ist.psu.edu/kim95securing.html
-
(1995)
Proceedings of the Workshop on Selected Areas in Cryptography SAC'95
, pp. 145-157
-
-
Kim, K.1
Lee, S.2
Park, S.3
Lee, D.4
-
16
-
-
0009319575
-
2-DES
-
Brickell, E.F, ed, CRYPTO 1992, Springer, Heidelberg
-
2-DES. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 497-511. Springer, Heidelberg (1993)
-
(1993)
LNCS
, vol.740
, pp. 497-511
-
-
Knudsen, L.R.1
-
18
-
-
33750843983
-
-
Kumar, S., Paar, C., Pelzl, J., Pfeiffer, G., Schimmler, M.: Breaking Ciphers with COPACOBANA - A Cost-Optimized Parallel Code Breaker. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, 4249, Springer, Heidelberg (2006)
-
Kumar, S., Paar, C., Pelzl, J., Pfeiffer, G., Schimmler, M.: Breaking Ciphers with COPACOBANA - A Cost-Optimized Parallel Code Breaker. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, Springer, Heidelberg (2006)
-
-
-
-
19
-
-
0000392205
-
Linear Cryptanalysis of DES Cipher
-
Helleseth, T, ed, EUROCRYPT 1993, Springer, Heidelberg
-
Matsui, M.: Linear Cryptanalysis of DES Cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 286-397. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.765
, pp. 286-397
-
-
Matsui, M.1
-
20
-
-
34548860970
-
New Ligh-Weight Crypto Algorithms for RFID
-
IEEE Computer Society Press, Los Alamitos, to appear
-
Poschmann, A., Leander, G., Schramm, K., Paar, C.: New Ligh-Weight Crypto Algorithms for RFID. In: Proceedings of The IEEE International Symposium on Circuits and Systems 2007 - ISCAS 2007, IEEE Computer Society Press, Los Alamitos, 2007 (to appear)
-
(2007)
Proceedings of The IEEE International Symposium on Circuits and Systems 2007 - ISCAS
-
-
Poschmann, A.1
Leander, G.2
Schramm, K.3
Paar, C.4
-
21
-
-
0004093038
-
-
Carl Hanser Verlag, München, Germany, 2nd edn
-
Rankl, W., Effing, W.: Smart Card Handbook. Carl Hanser Verlag, München, Germany, 2nd edn. (2002)
-
(2002)
Smart Card Handbook
-
-
Rankl, W.1
Effing, W.2
-
22
-
-
0023360836
-
Security and Performance Optimization of a New DES Data Encryption Chip
-
Verbauwhede, I., Hoornaert, F., Vandewalle, J., De Man, H.: Security and Performance Optimization of a New DES Data Encryption Chip. IEEE Journal of Solid-State Circuits 23(3), 647-656 (1988)
-
(1988)
IEEE Journal of Solid-State Circuits
, vol.23
, Issue.3
, pp. 647-656
-
-
Verbauwhede, I.1
Hoornaert, F.2
Vandewalle, J.3
De Man, H.4
|