-
1
-
-
84893543356
-
Concurrent fault detection in a hardware implementation of the RC5 encryption algorithm
-
The Hague, The Netherlands
-
Bertoni, G., Breveglieri, L., Koren, I., Maistri, P. and Piuri, V. (2003a). Concurrent fault detection in a hardware implementation of the RC5 encryption algorithm, Proceedings of the IEEE International Conference on Application-Specific Systems, Architectures and Processors, The Hague, The Netherlands, pp. 410-419.
-
(2003)
Proceedings of the IEEE International Conference on Application-Specific Systems, Architectures and Processors
, pp. 410-419
-
-
Bertoni, G.1
Breveglieri, L.2
Koren, I.3
Maistri, P.4
Piuri, V.5
-
2
-
-
0037624935
-
Error analysis and detection procedures for a hardware implementation of the advanced encryption standard
-
Bertoni, G., Breveglieri, L., Koren, I., Maistri, P. and Piuri, V. (2003b). Error analysis and detection procedures for a hardware implementation of the advanced encryption standard, IEEE Transactions on Computers 52 : 492-505.
-
(2003)
IEEE Transactions on Computers
, vol.52
, pp. 492-505
-
-
Bertoni, G.1
Breveglieri, L.2
Koren, I.3
Maistri, P.4
Piuri, V.5
-
3
-
-
84957677472
-
Differential cryptanalysis of the full 16-round des
-
E. F. Brickell (Ed.), CRYPTO, Springer, Heidelberg
-
Biham, E. and Shamir, A. (1992). Differential cryptanalysis of the full 16-round DES, in E. F. Brickell (Ed.), CRYPTO, Lecture Notes in Computer Science, Vol. 740, Springer, Heidelberg, pp. 487-496.
-
(1992)
Lecture Notes in Computer Science
, vol.740
, pp. 487-496
-
-
Biham, E.1
Shamir, A.2
-
4
-
-
0242404243
-
Analysis of involutional ciphers: Khazad and Anubis
-
T. Johansson (Ed.), Lund, Sweden, February 24-26, 2003, Revised Papers, Lecture Notes in Computer Science, Springer, New York, NY
-
Biryukov, A. (2003). Analysis of involutional ciphers: Khazad and Anubis, in T. Johansson (Ed.), Fast Software Encryption, 10th International Workshop, FSE 2003, Lund, Sweden, February 24-26, 2003, Revised Papers, Lecture Notes in Computer Science, Vol. 2887, Springer, New York, NY, pp. 45-53.
-
(2003)
Fast Software Encryption, 10th International Workshop, FSE 2003
, vol.2887
, pp. 45-53
-
-
Biryukov, A.1
-
6
-
-
67249094401
-
Distribution of the best nonzero differential and linear approximations of S-box functions
-
Chmiel, K. (2006a). Distribution of the best nonzero differential and linear approximations of S-box functions, Journal of Telecommunications and Information Technology 3 : 8-13.
-
(2006)
Journal of Telecommunications and Information Technology
, vol.3
, pp. 8-13
-
-
Chmiel, K.1
-
7
-
-
67249094836
-
Intermediate evaluation of block ciphers
-
Miȩdzyzdroje, Poland
-
Chmiel, K. (2006b). Intermediate evaluation of block ciphers, Proceedings of the 13th International Multi-Conference on Advanced Computer Systems ACS 2006, Miȩdzyzdroje, Poland, Vol. 1, pp. 331-342.
-
(2006)
Proceedings of the 13th International Multi-Conference on Advanced Computer Systems ACS 2006
, vol.1
, pp. 331-342
-
-
Chmiel, K.1
-
8
-
-
67249119787
-
On differential and linear approximation of S-box functions
-
New York, NY, USA
-
Chmiel, K. (2006c). On differential and linear approximation of S-box functions, Biometrics, Computer Security Systems and Artificial Intelligence Applications, New York, NY, USA, pp. 111-120.
-
(2006)
Biometrics, Computer Security Systems and Artificial Intelligence Applications
, pp. 111-120
-
-
Chmiel, K.1
-
9
-
-
67249102887
-
Involutional block cipher for limited resources
-
New Orleans, LA, USA
-
Chmiel, K., Grocholewska, A., Socha, P. and Stoklosa, J. (2008a). Involutional block cipher for limited resources, Global Communications Conference GLOBECOM, New Orleans, LA, USA, pp. 1852-1856.
-
(2008)
Global Communications Conference GLOBECOM
, pp. 1852-1856
-
-
Chmiel, K.1
Grocholewska, A.2
Socha, P.3
Stoklosa, J.4
-
10
-
-
77954401433
-
Scalable cipher for limited resources
-
Chmiel, K., Grocholewska, A., Socha, P. and Stoklosa, J. (2008b). Scalable cipher for limited resources, Polish Journal of Environmental Studies 17 (4C): 371-377.
-
(2008)
Polish Journal of Environmental Studies
, vol.17
, Issue.4 C
, pp. 371-377
-
-
Chmiel, K.1
Grocholewska, A.2
Socha, P.3
Stoklosa, J.4
-
11
-
-
84958765510
-
Cryptanalysis of block ciphers with overdefined systems of equations
-
Y. Zheng (Ed.), Springer, Berlin/Heidelberg
-
Courtois, N. and Pieprzyk, J. (2002). Cryptanalysis of block ciphers with overdefined systems of equations, in Y. Zheng (Ed.), ASIACRYPT, Lecture Notes in Computer Science, Vol. 2501, Springer, Berlin/Heidelberg, pp. 267-287.
-
(2002)
ASIACRYPT, Lecture Notes in Computer Science
, vol.2501
, pp. 267-287
-
-
Courtois, N.1
Pieprzyk, J.2
-
12
-
-
0004181422
-
AES proposal: Rijndael
-
Ventura, CA, USA
-
Daemen, J. and Rijmen, V. (1999). AES proposal: Rijndael, Proceedings of the First Advanced Encryption Standard Candidate Conference, Ventura, CA, USA.
-
(1999)
Proceedings of the First Advanced Encryption Standard Candidate Conference
-
-
Daemen, J.1
Rijmen, V.2
-
14
-
-
0242487632
-
Linear redundancy in S-boxes
-
T. Johansson (Ed.) Lund, Sweden, February 24-26, 2003, Revised Papers, Lecture Notes in Computer Science, Vol. 2887, Springer-Verlag, New York, NY
-
Fuller, J. and Millan, W. (2003). Linear redundancy in S-boxes, in T. Johansson (Ed.) Fast Software Encryption, 10th International Workshop, FSE 2003, Lund, Sweden, February 24-26, 2003, Revised Papers, Lecture Notes in Computer Science, Vol. 2887, Springer-Verlag, New York, NY, pp. 74-86.
-
(2003)
Fast Software Encryption, 10th International Workshop, FSE 2003
, pp. 74-86
-
-
Fuller, J.1
Millan, W.2
-
16
-
-
77954416914
-
Fast Software Encryption, 10th International Workshop, FSE 2003
-
Johansson, T. (Ed.), Lund, Sweden, February 24-26, 2003, Revised Papers, Springer-Verlag, New York, NY
-
Johansson, T. (Ed.) (2003). Fast Software Encryption, 10th International Workshop, FSE 2003, Lund, Sweden, February 24-26, 2003, Revised Papers, Lecture Notes in Computer Science, Vol. 2887, Springer-Verlag, New York, NY.
-
(2003)
Lecture Notes in Computer Science
, vol.2887
-
-
-
18
-
-
77954396289
-
-
Report No. 558, Poznań University of Technology, Institute of Control and Information Engineering, Poznań.
-
Socha, P. (2008). Scalable PP-1 block cipher Implementation, Report No. 558, Poznań University of Technology, Institute of Control and Information Engineering, Poznań.
-
(2008)
Scalable PP-1 Block Cipher Implementation
-
-
Socha, P.1
|