AES implementations

Results: 62



#Item
11Provably Secure MACs from Differentially-uniform Permutations and AES-based Implementations Kazuhiko Minematsu and Yukiyasu Tsunoo NEC Corporation

Provably Secure MACs from Differentially-uniform Permutations and AES-based Implementations Kazuhiko Minematsu and Yukiyasu Tsunoo NEC Corporation

Add to Reading List

Source URL: fse2006.iaik.tugraz.at

Language: English - Date: 2013-02-04 08:11:49
    12Published in IET Information Security 1(3):106–110, Strengthening Hardware AES Implementations against Fault Attacks Marc Joye 1 , Pascal Manet 2 and Jean-Baptiste Rigaud 3 1

    Published in IET Information Security 1(3):106–110, Strengthening Hardware AES Implementations against Fault Attacks Marc Joye 1 , Pascal Manet 2 and Jean-Baptiste Rigaud 3 1

    Add to Reading List

    Source URL: joye.site88.net

    Language: English - Date: 2015-09-04 19:43:41
      13Higher Order and Algebraic Side-Channel Attacks on Protected AES Implementations

      Higher Order and Algebraic Side-Channel Attacks on Protected AES Implementations

      Add to Reading List

      Source URL: www.emsec.rub.de

      Language: English - Date: 2014-01-17 04:27:30
        14Efficient Vector Implementations of AES-based Designs: A Case Study and New Implemenations for Grøstl Severin Holzer-Graf, Thomas Krinninger, Martin Pernull, Martin Schl¨affer1 , Peter Schwabe2 , David Seywald, and Wol

        Efficient Vector Implementations of AES-based Designs: A Case Study and New Implemenations for Grøstl Severin Holzer-Graf, Thomas Krinninger, Martin Pernull, Martin Schl¨affer1 , Peter Schwabe2 , David Seywald, and Wol

        Add to Reading List

        Source URL: cryptojedi.org

        Language: English - Date: 2013-02-01 12:17:47
          15Fast Assembler Implementations of the AES CPU Mode API Table sizes  Cycles/Block Best previous

          Fast Assembler Implementations of the AES CPU Mode API Table sizes Cycles/Block Best previous

          Add to Reading List

          Source URL: www.ii.uib.no

          - Date: 2003-12-07 17:54:06
            16Microsoft Word - 206k - µMACE_Security_Policy R010706 - MotApprovaed.doc

            Microsoft Word - 206k - µMACE_Security_Policy R010706 - MotApprovaed.doc

            Add to Reading List

            Source URL: csrc.nist.gov

            Language: English - Date: 2015-05-22 07:39:47
            17Open Crypto Audit Project TrueCrypt Cryptographic Review Prepared for:

            Open Crypto Audit Project TrueCrypt Cryptographic Review Prepared for:

            Add to Reading List

            Source URL: truecrypt.ch

            Language: English - Date: 2015-04-03 03:20:15
            18Security analysis and fault injection experiment on AES Olivier Faurax1,2 , Traian Muntean2 1 Ecole ´

            Security analysis and fault injection experiment on AES Olivier Faurax1,2 , Traian Muntean2 1 Ecole ´

            Add to Reading List

            Source URL: ofaurax.free.fr

            Language: English - Date: 2008-03-30 13:20:25
            19Microsoft Word - Enhanced Cryptographic Provider (rsaenh dll) SP.docx

            Microsoft Word - Enhanced Cryptographic Provider (rsaenh dll) SP.docx

            Add to Reading List

            Source URL: csrc.nist.gov

            Language: English - Date: 2014-12-17 16:20:38
            20Compact and Efficient Encryption/Decryption Module for FPGA Implementation of the AES Rijndael Very Well Suited for Small Embedded Applications Ga¨el Rouvroy, Franc¸ois-Xavier Standaert, Jean-Jacques Quisquater and Jea

            Compact and Efficient Encryption/Decryption Module for FPGA Implementation of the AES Rijndael Very Well Suited for Small Embedded Applications Ga¨el Rouvroy, Franc¸ois-Xavier Standaert, Jean-Jacques Quisquater and Jea

            Add to Reading List

            Source URL: www.intopix.com

            Language: English - Date: 2007-11-14 11:09:55