-
1
-
-
0003508560
-
Specification for the advanced encryption standard (AES)
-
Federal Information Processing Standards Publication 197, Online, Available
-
"Specification for the advanced encryption standard (AES)," Federal Information Processing Standards Publication 197, 2001. [Online]. Available: http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
-
(2001)
-
-
-
2
-
-
0003508570
-
Data encryption standard (DES)
-
Federal Information Processing Standard 46-3, Tech. Rep, Online, Available
-
National Institute of Standards and Technology, "Data encryption standard (DES)," Federal Information Processing Standard 46-3, Tech. Rep., 1999. [Online]. Available: http://csrc.nist.gov/publications/fips/fips46
-
(1999)
-
-
-
3
-
-
62349110092
-
-
N. I. of Standards and Technology, Secure hash standard (SHA-2) (+ change notice to include SHA-224), Federal Information Processing Standards Publication 180-2, Standard, Aug. 2002. [Online]. Available: http://csrc.nist.gov/publications/
-
N. I. of Standards and Technology, "Secure hash standard (SHA-2) (+ change notice to include SHA-224)," Federal Information Processing Standards Publication 180-2, Standard, Aug. 2002. [Online]. Available: http://csrc.nist.gov/publications/
-
-
-
-
4
-
-
33847171578
-
Securing embedded programmable gate arrays in secure circuits
-
N. Valette, L. Torres, G. Sassatelli, and F. Bancel, "Securing embedded programmable gate arrays in secure circuits," ipdps, vol. 0, p. 226, 2006.
-
(2006)
ipdps
, vol.0
, pp. 226
-
-
Valette, N.1
Torres, L.2
Sassatelli, G.3
Bancel, F.4
-
5
-
-
62349094797
-
-
P. Frison, E. Gautrin, D. Lavenier, and J. L. Scharbarg, Réseaux systoliques spécifiques à base du processeur, Institut National de Recherche en Informatique et en Automatique (INRIA), France, Tech. Rep., 1990. [Online]. Available: http://www.inria.fr/
-
P. Frison, E. Gautrin, D. Lavenier, and J. L. Scharbarg, "Réseaux systoliques spécifiques à base du processeur," Institut National de Recherche en Informatique et en Automatique (INRIA), France, Tech. Rep., 1990. [Online]. Available: http://www.inria.fr/
-
-
-
-
6
-
-
62349118588
-
System and method for encrypting data,
-
U.S. Patent US2008062803, Online, Available: http://v3.espacenet.com/textdoc?DB=EPODOC&IDX=US2008062803&F=0
-
D. Fronte, A. Perez, and E. Payrat, "System and method for encrypting data," U.S. Patent US2008062803, 2008. [Online]. Available: http://v3.espacenet.com/textdoc?DB=EPODOC&IDX=US2008062803&F=0
-
(2008)
-
-
Fronte, D.1
Perez, A.2
Payrat, E.3
-
7
-
-
57849133679
-
The AES in a systolic fashion: Implementation and results of celator processor
-
-, "The AES in a systolic fashion: Implementation and results of celator processor," in IEEE International Conference on Electronics, Circuits, and Systems, 2008.
-
(2008)
IEEE International Conference on Electronics, Circuits, and Systems
-
-
Fronte, D.1
Perez, A.2
Payrat, E.3
-
8
-
-
84893201486
-
A multi-algorithm cryptographic co-processor
-
-, "A multi-algorithm cryptographic co-processor," in Computing, Communications and Control Technologies, in the context of the International Multi-Conference on Engineering and Technological Innovation, 2008.
-
(2008)
Computing, Communications and Control Technologies, in the context of the International Multi-Conference on Engineering and Technological Innovation
-
-
Fronte, D.1
Perez, A.2
Payrat, E.3
-
10
-
-
57849097732
-
-
Online, Available
-
Tux the penguin. [Online]. Available: http://upload.wikimedia.org/ wikipedia/commons/a/af/Tux.png
-
Tux the penguin
-
-
-
11
-
-
62349134154
-
-
Atmel, AVR processor 8 bits, Tech. Rep., 2006. [Online]. Available: http://www.atmel.com/products/AVR/
-
Atmel, "AVR processor 8 bits," Tech. Rep., 2006. [Online]. Available: http://www.atmel.com/products/AVR/
-
-
-
-
12
-
-
62349110522
-
-
Online, Available
-
(2007) Arm 7 tdmi. [Online]. Available: http://www.arm.com/products/CPUs/ ARM7TDMI.html
-
Arm 7 tdmi
-
-
-
13
-
-
62349127018
-
-
embedded core, Online, Available
-
(2007) Arm 9 embedded core. [Online]. Available: http://www.arm.com/ products/CPUs/families/ARM9Family.html
-
, vol.9
-
-
-
14
-
-
62349107066
-
-
Atmel Secure Terminals, AT91SO100, Atmel, Tech. Rep., 2007. [Online]. Available: http://www.atmel.com/dyn/products/product-card.asp?part-id= 3810
-
Atmel Secure Terminals, "AT91SO100," Atmel, Tech. Rep., 2007. [Online]. Available: http://www.atmel.com/dyn/products/product-card.asp?part-id= 3810
-
-
-
-
17
-
-
29144513758
-
Performance considerations for an embedded implementation of oma drm 2
-
Washington, DC, USA: IEEE Computer Society
-
D. Thull and R. Sannino, "Performance considerations for an embedded implementation of oma drm 2," in DATE '05: Proceedings of the conference on Design, Automation and Test in Europe. Washington, DC, USA: IEEE Computer Society, 2005, pp. 46-51.
-
(2005)
DATE '05: Proceedings of the conference on Design, Automation and Test in Europe
, pp. 46-51
-
-
Thull, D.1
Sannino, R.2
-
18
-
-
62349124278
-
-
Standard AES cores, Helion standard AES, Helion, Tech. Rep., 2007.[Online]. Available: http://heliontech.com/aes-std.htm
-
Standard AES cores, "Helion standard AES," Helion, Tech. Rep., 2007.[Online]. Available: http://heliontech.com/aes-std.htm
-
-
-
-
19
-
-
34548356863
-
Interactive presentation: Implementation of AES/rijndael on a dynamically reconfigurable architecture
-
San Jose, CA, USA: EDA Consortium
-
C. Mucci, L. Vanzolini, F. Campi, and M. Toma, "Interactive presentation: Implementation of AES/rijndael on a dynamically reconfigurable architecture," in DATE '07: Proceedings of the conference on Design, automation and test in Europe. San Jose, CA, USA: EDA Consortium, 2007, pp. 355-360.
-
(2007)
DATE '07: Proceedings of the conference on Design, automation and test in Europe
, pp. 355-360
-
-
Mucci, C.1
Vanzolini, L.2
Campi, F.3
Toma, M.4
-
20
-
-
0038300424
-
Highly regular and scalable AES hardware architecture
-
Online, Available
-
S. Mangard, M. Aigner, and S. Dominikus, "Highly regular and scalable AES hardware architecture," IEEE Transactions on Computers, 2003. [Online]. Available: http://ieeexplore.ieee.org/Xplore/login.jsp?url=/ ie15/10557/33406/01581%498.pdf?arnumber=1581498
-
(2003)
IEEE Transactions on Computers
-
-
Mangard, S.1
Aigner, M.2
Dominikus, S.3
-
21
-
-
84946832086
-
A compact rijndael hardware architecture with s-box optimization
-
London, UK: Springer-Verlag, Online, Available
-
A. Satoh, S. Morioka, K. Takano, and S. Munetoh, "A compact rijndael hardware architecture with s-box optimization," in ASIACRYPT '01: Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security. London, UK: Springer-Verlag, 2001, pp. 239-254. [Online]. Available: http://www.springerlink.com/index/ BC7DVD7YMADU3J8L.pdf
-
(2001)
ASIACRYPT '01: Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security
, pp. 239-254
-
-
Satoh, A.1
Morioka, S.2
Takano, K.3
Munetoh, S.4
-
22
-
-
62349133256
-
Design of an efficient architecture for advanced encryption standard algorithm using systolic structures
-
Online, Available
-
S. Sharma and S. B. Sudarshan, "Design of an efficient architecture for advanced encryption standard algorithm using systolic structures," in International Conference of High Performance Computing (HiPC), 2005. [Online]. Available: http://www.hipc.org/hipc2005/posters/systolic.pdf
-
(2005)
International Conference of High Performance Computing (HiPC)
-
-
Sharma, S.1
Sudarshan, S.B.2
-
23
-
-
33750729555
-
-
R. Chaves, G. Kuzmanov, L. Sousa, and S. Vassiliadis, Improving SHA-2 hardware implementations, in CHES, ser. Lecture Notes in Computer Science, L. Goubin and M. Matsui, Eds., 4249. Springer, 2006, pp. 298-310.
-
R. Chaves, G. Kuzmanov, L. Sousa, and S. Vassiliadis, "Improving SHA-2 hardware implementations," in CHES, ser. Lecture Notes in Computer Science, L. Goubin and M. Matsui, Eds., vol. 4249. Springer, 2006, pp. 298-310.
-
-
-
-
24
-
-
29144532671
-
Hardware implementation analysis of SHA-256 and SHA-512 algorithms on fpgas
-
I. Ahmad and A. S. Das, "Hardware implementation analysis of SHA-256 and SHA-512 algorithms on fpgas," Computers & Electrical Engineering, vol. 31, no. 6, pp. 345-360, 2005.
-
(2005)
Computers & Electrical Engineering
, vol.31
, Issue.6
, pp. 345-360
-
-
Ahmad, I.1
Das, A.S.2
-
25
-
-
62349122918
-
-
Hashing algorithm generator SHA-256, cadence datasheet
-
"Hashing algorithm generator SHA-256, cadence datasheet."
-
-
-
-
26
-
-
0033705991
-
Side channel cryptanalysis of product ciphers
-
Online, Available
-
J. Kelsey, B. Schneier, D. Wagner, and C. Hall, "Side channel cryptanalysis of product ciphers," in The Journal of Cryptography, Counterpane, University of Berkley and University of Princeton, 2000. [Online]. Available: http:/www.schneier.com/paper-side-channel.html
-
(2000)
The Journal of Cryptography, Counterpane, University of Berkley and University of Princeton
-
-
Kelsey, J.1
Schneier, B.2
Wagner, D.3
Hall, C.4
-
27
-
-
57849146147
-
A study of power analysis and the AES (recommendation for designing power analysis resistant attack)
-
George Mason University
-
T. Lash, "A study of power analysis and the AES (recommendation for designing power analysis resistant attack)," in MS Scholarly Paper, George Mason University, 2002.
-
(2002)
MS Scholarly Paper
-
-
Lash, T.1
|