AES implementations

Results: 62



#Item
1Computing / Computer architecture / Programming language theory / Instruction set architectures / Procedural programming languages / Microcontrollers / R0 / ALGOL 68 / STM32 / ARM architecture

AES on the ARM Cortex-M3 and M4 Peter Schwabe and Ko Stoffelen More AES software implementations? •

Add to Reading List

Source URL: ko.stoffelen.nl

Language: English - Date: 2018-02-09 07:39:38
2Computing / Computer architecture / Programming language theory / Microcontrollers / Instruction set architectures / Procedural programming languages / ARM architecture / R0 / ALGOL 68 / STM32

All the AES You Need on Cortex-M3 and M4 Peter Schwabe and Ko Stoffelen More AES software implementations? •

Add to Reading List

Source URL: ko.stoffelen.nl

Language: English - Date: 2018-02-09 07:39:37
3

A Systematic Study of Cache Side Channels across AES Implementations Heiko Mantel1 , Alexandra Weber1 , and Boris K¨opf 2 1 Computer Science Department, TU Darmstadt, Darmstadt, Germany

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2017-05-18 11:37:54
    4Cryptography / Advanced Encryption Standard / Block ciphers / Data Encryption Standard / Finite fields / Block size / Rijndael S-box / AES implementations / Blowfish

    ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

    Add to Reading List

    Source URL: www.ijmetmr.com

    Language: English - Date: 2015-06-03 03:08:26
    5Cryptography standards / FIPS 140-2 / FIPS 140 / Bouncy Castle / Cryptographic Module Validation Program / SHA-2 / Advanced Encryption Standard / Critical Security Parameter / Zeroisation / Cryptography / PKCS / AES implementations

    Legion of the Bouncy Castle Inc. BC-FJA (Bouncy Castle FIPS Java API) Non-Proprietary FIPSCryptographic Module Security Policy Version: 0.5 Date:

    Add to Reading List

    Source URL: www.bouncycastle.org

    Language: English - Date: 2016-08-02 22:30:34
    6Advanced Encryption Standard / Cryptographic software / Block cipher modes of operation / AES instruction set / Crypto++ / LEX / Symmetric-key algorithm / Block cipher / IPsec / AES implementations / Galois/Counter Mode

    International Journal of Computer Science and Applications, Technomathematics Research Foundation Vol. 13, No. 2, pp. 89 – 105, 2016 ADVANCED ENCRYPTION STANDARD ANALYSIS WITH MULTIMEDIA DATA ON INTEL® AES-NI ARCHI

    Add to Reading List

    Source URL: www.tmrfindia.org

    Language: English
    7Cryptography / Cryptography standards / FIPS 140-2 / FIPS 140 / Bouncy Castle / SHA-2 / Cryptographic Module Validation Program / Advanced Encryption Standard / Critical Security Parameter / Zeroisation / PKCS / AES implementations

    Legion of the Bouncy Castle Inc. BC-FJA (Bouncy Castle FIPS Java API) Non-Proprietary FIPSCryptographic Module Security Policy Version: 0.1 Date:

    Add to Reading List

    Source URL: www.bouncycastle.org

    Language: English - Date: 2016-04-29 19:57:45
    8Cryptography / Cryptography standards / FIPS 140-2 / FIPS 140 / Bouncy Castle / SHA-2 / Cryptographic Module Validation Program / Advanced Encryption Standard / Critical Security Parameter / Zeroisation / PKCS / AES implementations

    Legion of the Bouncy Castle Inc. BC-FJA (Bouncy Castle FIPS Java API) Non-Proprietary FIPSCryptographic Module Security Policy Version: 0.1 Date:

    Add to Reading List

    Source URL: bouncycastle.org

    Language: English
    9Cryptographic software / Cryptography standards / Bouncy Castle / Java Cryptography Extension / Advanced Encryption Standard / Cryptographic Module Validation Program / Data Encryption Standard / Java Secure Socket Extension / FIPS 140 / Key Wrap / Camellia / AES implementations

    Legion of the Bouncy Castle Inc. BC-FJA (Bouncy Castle FIPS Java API) User Guide Version: 0.1 Date: Legion of the Bouncy Castle Inc.

    Add to Reading List

    Source URL: bouncycastle.org

    Language: English - Date: 2016-04-08 19:51:32
    10Cryptography / Side-channel attacks / Advanced Encryption Standard / Pseudorandom number generators / Data masking / AES implementations / Power analysis / Block cipher / Entropy

    Microsoft Word - Reconfig2013_cr_v01.doc

    Add to Reading List

    Source URL: euler.ecs.umass.edu

    Language: English - Date: 2013-11-15 15:24:17
    UPDATE