-
3
-
-
84890522850
-
Communication theory of secrecy systems
-
C. E. Shannon. Communication theory of secrecy systems. In Bell System Technical Journal, volume 28(4), pages 656-715, 1949.
-
(1949)
Bell System Technical Journal
, vol.28
, Issue.4
, pp. 656-715
-
-
Shannon, C.E.1
-
4
-
-
84949194630
-
A simple algebraic representation of Rijndael
-
Selected Areas in Cryptography SAC01
-
N. Ferguson, R. Schroeppel, and D. Whiting. A simple algebraic representation of Rijndael. In Selected Areas in Cryptography SAC01, LNCS 2259, pages 103-111, 2001.
-
(2001)
LNCS
, vol.2259
, pp. 103-111
-
-
Ferguson, N.1
Schroeppel, R.2
Whiting, D.3
-
5
-
-
84937413721
-
Essential algebraic structure within the AES
-
Crypto'02
-
S. Murphy and M. J. Robshaw. Essential algebraic structure within the AES. In Crypto'02, LNCS 2442, pages 1-16, 2002.
-
(2002)
LNCS
, vol.2442
, pp. 1-16
-
-
Murphy, S.1
Robshaw, M.J.2
-
6
-
-
58449128631
-
A polynomial description of the Rijndael Advanced Encryption Standard
-
J. Rosenthal. A polynomial description of the Rijndael Advanced Encryption Standard. Journal of Algebra and its Applications, 2(2):223-236, 2003.
-
(2003)
Journal of Algebra and its Applications
, vol.2
, Issue.2
, pp. 223-236
-
-
Rosenthal, J.1
-
7
-
-
0037426995
-
Comments on the security of AES and the XSL technique
-
S. Murphy and M. J. Robshaw. Comments on the security of AES and the XSL technique. Electronics Letters, 39(1):36-38, 2003.
-
(2003)
Electronics Letters
, vol.39
, Issue.1
, pp. 36-38
-
-
Murphy, S.1
Robshaw, M.J.2
-
9
-
-
84896467423
-
Security in heterogeneous large scale environments
-
S. Vidalis, M. Pilgermann, E. Morakis, and A. Blyth. Security in heterogeneous large scale environments. International Journal of Innovative Computing, 1(4), 2005.
-
(2005)
International Journal of Innovative Computing
, vol.1
, Issue.4
-
-
Vidalis, S.1
Pilgermann, M.2
Morakis, E.3
Blyth, A.4
-
10
-
-
33744494874
-
An AES S-box to increase complexity and cryptographic analysis
-
J. Liu, B. Wai, X. Cheng, and X. Wang. An AES S-box to increase complexity and cryptographic analysis. In Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1, pages 724-728, 2005.
-
(2005)
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA'05)
, vol.1
, pp. 724-728
-
-
Liu, J.1
Wai, B.2
Cheng, X.3
Wang, X.4
-
12
-
-
0037673240
-
A fully pipelined memoryless 17.8 Gbps AES-128 encryptor
-
K. U. Järvinen, M. Tommiska, and J. Skyttä. A fully pipelined memoryless 17.8 Gbps AES-128 encryptor. In FPGA 2003, pages 207-215, 2003.
-
(2003)
FPGA 2003
, pp. 207-215
-
-
Järvinen, K.U.1
Tommiska, M.2
Skyttä, J.3
-
13
-
-
38049062977
-
A high-security and low-power AES S-Box full-custom design for wireless sensor network
-
L. Zhenglin, Z. Yonghong, Z. Xuecheng, H. Yu, and C. Yicheng. A high-security and low-power AES S-Box full-custom design for wireless sensor network. In International Conference on Wireless Communications, Networking and Mobile Computing - WiCom 2007, pages 2499-2502, 2007.
-
(2007)
International Conference on Wireless Communications, Networking and Mobile Computing - WiCom
, pp. 2499-2502
-
-
Zhenglin, L.1
Yonghong, Z.2
Xuecheng, Z.3
Yu, H.4
Yicheng, C.5
-
14
-
-
35248894915
-
An optimized S-Box circuit architecture for low power AES design
-
Workshop on Cryptographic Hardware and Embedded Systems CHES'02
-
S. Morioka and A. Satoh. An optimized S-Box circuit architecture for low power AES design. In Workshop on Cryptographic Hardware and Embedded Systems (CHES'02), LNCS 2523, pages 172-186, 2002.
-
(2002)
LNCS
, vol.2523
, pp. 172-186
-
-
Morioka, S.1
Satoh, A.2
-
15
-
-
24144451042
-
A systematic evaluation of compact hardware implementations for the Rijndael S-box
-
CT-RSA
-
N. Mentens, L. Batina, B. Preneel, and I. Verbauwhede. A systematic evaluation of compact hardware implementations for the Rijndael S-box. In CT-RSA, LNCS 3376, pages 323-333, 2005.
-
(2005)
LNCS
, vol.3376
, pp. 323-333
-
-
Mentens, N.1
Batina, L.2
Preneel, B.3
Verbauwhede, I.4
-
16
-
-
35248880566
-
Very compact FPGA implementation of the AES algorithm
-
Workshop on Cryptographic Hardware and Embedded Systems CHES'03
-
C. Pawed and K. Gaj. Very compact FPGA implementation of the AES algorithm. In Workshop on Cryptographic Hardware and Embedded Systems (CHES'03), LNCS 2779, pages 319-333, 2003.
-
(2003)
LNCS
, vol.2779
, pp. 319-333
-
-
Pawed, C.1
Gaj, K.2
-
17
-
-
84946832086
-
A compact Rijndael hardware architecture with S-box optimization
-
ASIACRYPT'01
-
A. Satoh, S. Morioka, K. Takano, and S. Munetoh. A compact Rijndael hardware architecture with S-box optimization. In ASIACRYPT'01, LNCS 2248, pages 239-254, 2001.
-
(2001)
LNCS
, vol.2248
, pp. 239-254
-
-
Satoh, A.1
Morioka, S.2
Takano, K.3
Munetoh, S.4
-
18
-
-
27244440344
-
A very compact S-Box for AES
-
Workshop on Cryptographic Hardware and Embedded Systems CHES'05
-
D. Canright. A very compact S-Box for AES. In Workshop on Cryptographic Hardware and Embedded Systems (CHES'05), LNCS 3659, pages 441-455, 2005.
-
(2005)
LNCS
, vol.3659
, pp. 441-455
-
-
Canright, D.1
-
20
-
-
0004086411
-
Pulse code communication
-
U.S. Patent 2, 632, 058
-
F. Gray. Pulse code communication. U.S. Patent 2, 632, 058, 1947.
-
(1947)
-
-
Gray, F.1
-
23
-
-
84947929289
-
The interpolation attack on block ciphers
-
Fast Software Encryption
-
T. Jakobsen and L. R. Knudsen. The interpolation attack on block ciphers. In Fast Software Encryption, LNCS 1267, pages 28-40, 1997.
-
(1997)
LNCS
, vol.1267
, pp. 28-40
-
-
Jakobsen, T.1
Knudsen, L.R.2
-
24
-
-
84958765510
-
Cryptanalysis of block ciphers with overdefined systems of equations
-
ASI-ACRYPT'02
-
N. T. Courtois and J. Pieprzyk. Cryptanalysis of block ciphers with overdefined systems of equations. In ASI-ACRYPT'02, LNCS 2501, pages 267-287, 2002.
-
(2002)
LNCS
, vol.2501
, pp. 267-287
-
-
Courtois, N.T.1
Pieprzyk, J.2
-
26
-
-
85025704284
-
Linear cryptanalysis method for DES cipher
-
EUROCRYPT93
-
M. Matsui. Linear cryptanalysis method for DES cipher. In EUROCRYPT93, LNCS 765, pages 386-397, 1994.
-
(1994)
LNCS
, vol.765
, pp. 386-397
-
-
Matsui, M.1
-
27
-
-
84962968104
-
Differentially uniform mappings for cryptography
-
EUROCRYPT93
-
K. Nyberg. Differentially uniform mappings for cryptography. In EUROCRYPT93, LNCS 765, pages 55-64, 1994.
-
(1994)
LNCS
, vol.765
, pp. 55-64
-
-
Nyberg, K.1
-
28
-
-
85028761102
-
On almost perfect nonlinear permutations
-
EUROCRYPT'93
-
T. Beth and C. Ding. On almost perfect nonlinear permutations. In EUROCRYPT'93, LNCS 765, pages 65-76, 1994.
-
(1994)
LNCS
, vol.765
, pp. 65-76
-
-
Beth, T.1
Ding, C.2
-
29
-
-
84903595110
-
Differential cryptanalysis of DES-like cryptosystems
-
CRYPTO 90
-
E. Biham and A. Shamir. Differential cryptanalysis of DES-like cryptosystems. In CRYPTO 90, LNCS 537, pages 2-21, 1990.
-
(1990)
LNCS
, vol.537
, pp. 2-21
-
-
Biham, E.1
Shamir, A.2
-
30
-
-
85020573990
-
On the design of S-boxes
-
Crypto '85
-
A. F. Webster and E. Tavares. On the design of S-boxes. In Crypto '85, LNCS 219, pages 523-534, 1985.
-
(1985)
LNCS
, vol.219
, pp. 523-534
-
-
Webster, A.F.1
Tavares, E.2
|