AES implementations

Results: 62



#Item
11

Provably Secure MACs from Differentially-uniform Permutations and AES-based Implementations Kazuhiko Minematsu and Yukiyasu Tsunoo NEC Corporation

Add to Reading List

Source URL: fse2006.iaik.tugraz.at

Language: English - Date: 2013-02-04 08:11:49
    12

    Published in IET Information Security 1(3):106–110, Strengthening Hardware AES Implementations against Fault Attacks Marc Joye 1 , Pascal Manet 2 and Jean-Baptiste Rigaud 3 1

    Add to Reading List

    Source URL: joye.site88.net

    Language: English - Date: 2015-09-04 19:43:41
      13

      Higher Order and Algebraic Side-Channel Attacks on Protected AES Implementations

      Add to Reading List

      Source URL: www.emsec.rub.de

      Language: English - Date: 2014-01-17 04:27:30
        14

        Efficient Vector Implementations of AES-based Designs: A Case Study and New Implemenations for Grøstl Severin Holzer-Graf, Thomas Krinninger, Martin Pernull, Martin Schl¨affer1 , Peter Schwabe2 , David Seywald, and Wol

        Add to Reading List

        Source URL: cryptojedi.org

        Language: English - Date: 2013-02-01 12:17:47
          15

          Fast Assembler Implementations of the AES CPU Mode API Table sizes Cycles/Block Best previous

          Add to Reading List

          Source URL: www.ii.uib.no

          - Date: 2003-12-07 17:54:06
            16FIPS 140-2 / FIPS 140 / Cryptographic software / Data Encryption Standard / Zeroisation / Internet Key Exchange / Key Wrap / AES implementations / Crypto++ / Cryptography / Cryptography standards / Advanced Encryption Standard

            Microsoft Word - 206k - µMACE_Security_Policy R010706 - MotApprovaed.doc

            Add to Reading List

            Source URL: csrc.nist.gov

            Language: English - Date: 2015-05-22 07:39:47
            17Cross-platform software / TrueCrypt / AES implementations / Cryptography / Software / Cryptographic software / Disk encryption

            Open Crypto Audit Project TrueCrypt Cryptographic Review Prepared for:

            Add to Reading List

            Source URL: truecrypt.ch

            Language: English - Date: 2015-04-03 03:20:15
            18Fault injection / MARS / Substitution-permutation network / Message authentication codes / Poly1305-AES / AES implementations / Cryptography / Advanced Encryption Standard / Block ciphers

            Security analysis and fault injection experiment on AES Olivier Faurax1,2 , Traian Muntean2 1 Ecole ´

            Add to Reading List

            Source URL: ofaurax.free.fr

            Language: English - Date: 2008-03-30 13:20:25
            19Windows NT / Microsoft CryptoAPI / CryptGenRandom / Windows / Cryptographic Service Provider / Security and safety features new to Windows Vista / AES implementations / Microsoft Windows / Software / Cryptographic software

            Microsoft Word - Enhanced Cryptographic Provider (rsaenh dll) SP.docx

            Add to Reading List

            Source URL: csrc.nist.gov

            Language: English - Date: 2014-12-17 16:20:38
            20Block ciphers / Reconfigurable computing / AES implementations / DEAL / Field-programmable gate array / LEX / Xilinx / KHAZAD / Cryptography / Advanced Encryption Standard / Data Encryption Standard

            Compact and Efficient Encryption/Decryption Module for FPGA Implementation of the AES Rijndael Very Well Suited for Small Embedded Applications Ga¨el Rouvroy, Franc¸ois-Xavier Standaert, Jean-Jacques Quisquater and Jea

            Add to Reading List

            Source URL: www.intopix.com

            Language: English - Date: 2007-11-14 11:09:55
            UPDATE