AES implementations

Results: 62



#Item
21Contents I Compact and Efficient Encryption/Decryption Module Implementation of AES I.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . .

Contents I Compact and Efficient Encryption/Decryption Module Implementation of AES I.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . .

Add to Reading List

Source URL: www.intopix.com

Language: English - Date: 2007-11-14 11:11:18
22CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm (Extended Edition)? Junaid Jameel Ahmad1 , Shujun Li1,2 , Ahmad-Reza Sadeghi3,4 , and Thomas Schneider3 1

CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm (Extended Edition)? Junaid Jameel Ahmad1 , Shujun Li1,2 , Ahmad-Reza Sadeghi3,4 , and Thomas Schneider3 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-05-21 10:33:05
23Algebraic Side-Channel Collision Attacks on AES Andrey Bogdanov1 and Andrey Pyshkin2 1  Chair for Communication Security

Algebraic Side-Channel Collision Attacks on AES Andrey Bogdanov1 and Andrey Pyshkin2 1 Chair for Communication Security

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-12-20 06:12:45
24Security Now! #The TrueCrypt Audit  ( Elaine is fine! -- It was apparently just a transient eMail glitch. All is wel! ) This week on Security Now! ●

Security Now! #The TrueCrypt Audit  ( Elaine is fine! -- It was apparently just a transient eMail glitch. All is wel! ) This week on Security Now! ●

Add to Reading List

Source URL: www.grc.com

Language: English - Date: 2015-04-07 13:11:05
25With the attached patch[removed]patch) we introduce transparent encryption for HFiles and the WAL for consideration. This work builds on a crypto codec framework to be submitted to the Hadoop Common and MapReduce projects.

With the attached patch[removed]patch) we introduce transparent encryption for HFiles and the WAL for consideration. This work builds on a crypto codec framework to be submitted to the Hadoop Common and MapReduce projects.

Add to Reading List

Source URL: issues.apache.org

Language: English
26Open Crypto Audit Project TrueCrypt Cryptographic Review Prepared for:

Open Crypto Audit Project TrueCrypt Cryptographic Review Prepared for:

Add to Reading List

Source URL: opencryptoaudit.org

Language: English - Date: 2015-04-02 06:24:01
27Protegrity Cryptographic Module FIPS[removed]Non-Proprietary Security Policy DOCUMENT VERSION – 1.1 DATE – [removed]

Protegrity Cryptographic Module FIPS[removed]Non-Proprietary Security Policy DOCUMENT VERSION – 1.1 DATE – [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-03-02 10:46:49
28Faster and Timing-Attack Resistant AES-GCM Emilia K¨ asper1 and Peter Schwabe2 ⋆

Faster and Timing-Attack Resistant AES-GCM Emilia K¨ asper1 and Peter Schwabe2 ⋆

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-06-16 09:09:11
29About AES – Advanced Encryption Standard A short introduction[removed]Copyright 2007 Svante Seleborg Axantum Software AB A short introduction to AES, the most common algorithm for current implementations of informat

About AES – Advanced Encryption Standard A short introduction[removed]Copyright 2007 Svante Seleborg Axantum Software AB A short introduction to AES, the most common algorithm for current implementations of informat

Add to Reading List

Source URL: www.axantum.com

Language: English - Date: 2014-05-04 18:08:46
30Provably Secure MACs from Differentially-uniform Permutations and AES-based Implementations Kazuhiko Minematsu and Yukiyasu Tsunoo NEC Corporation

Provably Secure MACs from Differentially-uniform Permutations and AES-based Implementations Kazuhiko Minematsu and Yukiyasu Tsunoo NEC Corporation

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-04-18 10:40:57