-
1
-
-
78049351742
-
Quark: A lightweight hash
-
J.P. Aumasson, L. Henzen, W. Meier, and M. Naya-Plasencia, Quark: A Lightweight Hash, Proc. 12th Intl Workshop Cryptographic Hardware and Embedded Systems (CHES 10), pp. 1-15, 2010.
-
(2010)
Proc. 12th Intl Workshop Cryptographic Hardware and Embedded Systems (CHES 10)
, pp. 1-15
-
-
Aumasson, J.P.1
Henzen, L.2
Meier, W.3
Naya-Plasencia, M.4
-
2
-
-
44449147491
-
On the indifferentiability of the sponge construction
-
DOI 10.1007/978-3-540-78967-3-11, Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
G. Bertoni, J. Daemen, M. Peeters, and G. Van Assche, On the Indifferentiability of the Sponge Construction, Proc. Theory and Applications Cryptographic Techniques 27th Ann. Intl Conf. Advances Cryptology (EUROCRYPT 08), pp. 181-197, 2008. (Pubitemid 351762830)
-
(2008)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4965 LNCS
, pp. 181-197
-
-
Bertoni, G.1
Daemen, J.2
Peeters, M.3
Van Assche, G.4
-
3
-
-
78049328962
-
Sponge- based pseudo-random number generators
-
G. Bertoni, J. Daemen, M. Peeters, and G. Van Assche, Sponge- Based Pseudo-Random Number Generators, Proc. 12th Intl Conf. Cryptographic Hardware and Embedded Systems (CHES 10), pp. 33- 47, 2010.
-
(2010)
Proc. 12th Intl Conf. Cryptographic Hardware and Embedded Systems (CHES 10)
, pp. 33-47
-
-
Bertoni, G.1
Daemen, J.2
Peeters, M.3
Van Assche, G.4
-
4
-
-
80053502266
-
SPONGENT: A Lightweight Hash Function
-
A. Bogdanov, M. Knezevic, G. Leander, D. Toz, K. Varici, and I. Verbauwhede, SPONGENT: A Lightweight Hash Function, Proc. 13th Intl Conf. Cryptographic Hardware and Embedded Systems (CHES 11), pp. 312-325, 2011.
-
(2011)
Proc. 13th Intl Conf. Cryptographic Hardware and Embedded Systems (CHES 11)
, pp. 312-325
-
-
Bogdanov, A.1
Knezevic, M.2
Leander, G.3
Toz, D.4
Varici, K.5
Verbauwhede, I.6
-
5
-
-
37149045263
-
PRESENT: An ultra-lightweight block cipher
-
A. Bogdanov, L.R. Knudsen, G. Leander, C. Paar, A. Poschmann, M.J.B. Robshaw, Y. Seurin, and C. Vikkelsoe, PRESENT: An Ultra-Lightweight Block Cipher, Proc. Ninth Intl Workshop Cryptographic Hardware and Embedded Systems (CHES 07), pp. 450-466, 2007.
-
(2007)
Proc. Ninth Intl Workshop Cryptographic Hardware and Embedded Systems (CHES 07)
, pp. 450-466
-
-
Bogdanov, A.1
Knudsen, L.R.2
Leander, G.3
Paar, C.4
Poschmann, A.5
Robshaw, M.J.B.6
Seurin, Y.7
Vikkelsoe, C.8
-
6
-
-
51049092732
-
Hash functions and RFID Tags: Mind the gap
-
A. Bogdanov, G. Leander, C. Paar, A. Poschmann, M.J.B. Robshaw, and Y. Seurin, Hash Functions and RFID Tags: Mind the Gap, Proc. 10th Intl Workshop Cryptographic Hardware and Embedded Systems (CHES 08), pp. 283-299, 2008.
-
(2008)
Proc. 10th Intl Workshop Cryptographic Hardware and Embedded Systems (CHES 08)
, pp. 283-299
-
-
Bogdanov, A.1
Leander, G.2
Paar, C.3
Poschmann, A.4
Robshaw, M.J.B.5
Seurin, Y.6
-
9
-
-
51849150617
-
Sponge functions
-
May
-
G. Bertoni, J. Daemen, M. Peeters, and G. Van Assche, Sponge Functions, Proc. Ecrypt Hash Workshop, May 2007.
-
(2007)
Proc. Ecrypt Hash Workshop
-
-
Bertoni, G.1
Daemen, J.2
Peeters, M.3
Van Assche, G.4
-
11
-
-
70350589237
-
KATAN and KTANTAN-A family of small and efficient hardware-oriented block ciphers
-
C. De Canniére, O. Dunkelman, and M. Kne-zevi c, KATAN and KTANTAN-A Family of Small and Efficient Hardware-Oriented Block Ciphers, Proc. 11th Intl Workshop Cryptographic Hardware and Embedded Systems (CHES 09), pp. 272-288, 2009.
-
(2009)
Proc. 11th Intl Workshop Cryptographic Hardware and Embedded Systems (CHES 09)
, pp. 272-288
-
-
De Canniére, C.1
Dunkelman, M.O.2
Knezevi, C.3
-
12
-
-
84866681432
-
-
A. Duc, J. Guo, T. Peyrin, and L. Wei, Unaligned Rebound Attack-Application to Keccak, http://eprint.iacr.org/2011/420, 2011.
-
(2011)
Unaligned rebound attack-application to keccak
-
-
Duc, A.1
Guo, J.2
Peyrin, T.3
Wei, L.4
-
13
-
-
68849109980
-
-
P. Gauravaram, L.R. Knudsen, K. Matusiewicz, F. Mendel, C. Rechberger, M. Schlaffer, and S.S. Thomsen, Grstl-A SHA-3 Candidate, http://www.groestl. info/Groestl.pdf, 2011.
-
(2011)
Grstl-A SHA-3 Candidate
-
-
Gauravaram, P.1
Knudsen, L.R.2
Matusiewicz, K.3
Mendel, F.4
Rechberger, C.5
Schlaffer, M.6
Thomsen, S.S.7
-
14
-
-
80051991385
-
The PHOTON family of lightweight hash functions
-
J. Guo, T. Peyrin, and A. Poschmann, The PHOTON Family of Lightweight Hash Functions, Proc. 31st Ann. Conference Advances Cryptology (CRYPTO 11) , pp. 222-239, 2011.
-
(2011)
Proc. 31st Ann. Conference Advances Cryptology (CRYPTO 11)
, pp. 222-239
-
-
Guo, J.1
Peyrin, T.2
Poschmann, A.3
-
16
-
-
70350639755
-
ECC is ready for RFID a proof in silicon
-
D.M. Hein, J. Wolkerstorfer, and N. Felber, ECC Is Ready for RFID-A Proof in Silicon, Proc. Intl Workshop Selected Areas in Cryptography, pp. 401-413, 2008.
-
(2008)
Proc. Intl Workshop Selected Areas in Cryptography
, pp. 401-413
-
-
Hein, D.M.1
Wolkerstorfer, J.2
Felber, N.3
-
17
-
-
80053543053
-
-
L. Henzen, J.P. Aumasson, W. Meier, and R.C.W. Phan, VLSI Characterization of the Cryptographic Hash Function BLAKE, http://131002.net/ data/papers/HAMP10.pdf, 2010.
-
(2010)
VLSI Characterization of the Cryptographic Hash Function BLAKE
-
-
Henzen, L.1
Aumasson, J.P.2
Meier, W.3
Phan, R.C.W.4
-
18
-
-
67650146012
-
Efficient hardware architecture of SHA-256 algorithm for trusted mobile computing
-
M. Kim, J. Ryou, and S. Jun, Efficient Hardware Architecture of SHA-256 Algorithm for Trusted Mobile Computing, Proc. Intl Conf. Theory and Application of Cryptology and Information Security (Inscrypt 08), pp. 240-252, 2008.
-
(2008)
Proc. Intl Conf. Theory and Application of Cryptology and Information Security (Inscrypt 08)
, pp. 240-252
-
-
Kim, M.1
Ryou, J.2
Jun, S.3
-
19
-
-
79958001603
-
On Linear Hulls, Statistical Saturation Attacks, Present and a Cryptanalysis of Puffin
-
G. Leander, On Linear Hulls, Statistical Saturation Attacks, Present and a Cryptanalysis of Puffin, Proc. 30th Ann. Intl Conf. Theory and Applications Cryptographic Techniques: Advances in Cryptology, pp. 303-322, 2011.
-
(2011)
Proc. 30th Ann. Intl Conf. Theory and Applications Cryptographic Techniques: Advances in Cryptology
, pp. 303-322
-
-
Leander, G.1
-
20
-
-
80052002674
-
A cryptanalysis of PRINTcipher: The invariant subspace attack
-
G. Leander, M.A. Abdelraheem, H. AlKhzaimi, and E. Zenner, A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack, Proc. 31st Ann. Conf. Advances in Cryptology, pp. 206-221, 2011.
-
(2011)
Proc. 31st Ann. Conf. Advances in Cryptology
, pp. 206-221
-
-
Leander, G.1
Abdelraheem, M.A.2
Alkhzaimi, H.3
Zenner, E.4
-
21
-
-
70350398631
-
The rebound attack: Cryptanalysis of reduced whirlpool and grstl
-
F. Mendel, C. Rechberger, M. Schlaffer, and S.S. Thomsen, The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grstl, Proc. 16th Intl Workshop Fast Software Encryption (FSE 09), pp. 260- 276, 2009.
-
(2009)
Proc. 16th Intl Workshop Fast Software Encryption (FSE 09)
, pp. 260-276
-
-
Mendel, F.1
Rechberger, C.2
Schlaffer, M.3
Thomsen, S.S.4
-
23
-
-
52949130277
-
Fast hash-based signatures on constrained devices
-
S. Rohde, T. Eisenbarth, E. Dahmen, J. Buchmann, and C. Paar, Fast Hash-Based Signatures on Constrained Devices, Proc. Eighth IFIP WG 8.8/11.2 Intl Conf. Smart Card Research and Advanced Applications, pp. 104-117, 2008.
-
(2008)
Proc. Eighth IFIP WG 8.8/11.2 Intl Conf. Smart Card Research and Advanced Applications
, pp. 104-117
-
-
Rohde, S.1
Eisenbarth, T.2
Dahmen, E.3
Buchmann, J.4
Paar, C.5
-
24
-
-
84883375875
-
Compact hardware implementations of the SHA-3 candidates ARIRANG
-
S. Tillich, M. Feldhofer, W. Issovits, T. Kern, H. Kureck, M. Muehlberghuber, G. Neubauer, A. Reiter, A. Koefler, and M. Mayrhofer, Compact Hardware Implementations of the SHA-3 Candidates ARIRANG, BLAKE, Grstl, and Skein, http:// eprint.iacr.org/2009/349, 2009.
-
(2009)
BLAKE, Grstl, and Skein
-
-
Tillich, S.1
Feldhofer, M.2
Issovits, W.3
Kern, T.4
Kureck, H.5
Muehlberghuber, M.6
Neubauer, G.7
Reiter, A.8
Koefler, A.9
Mayrhofer, M.10
-
26
-
-
18144420462
-
Scan based side channel attack on dedicated hardware implementations of Data Encryption Standard
-
12.2, Proceedings - International Test Conference 2004
-
B. Yang, K. Wu, and R. Karri, Scan Based Side Channel Attack on Dedicated Hardware Implementations of Data Encryption Standard, Proc. Intl Test Conf., pp. 339-344, 2004. (Pubitemid 40610032)
-
(2004)
Proceedings - International Test Conference
, pp. 339-344
-
-
Yang, B.1
Wu, K.2
Karri, R.3
|