AES implementations

Results: 62



#Item
1AES on the ARM Cortex-M3 and M4 Peter Schwabe and Ko Stoffelen More AES software implementations? •

AES on the ARM Cortex-M3 and M4 Peter Schwabe and Ko Stoffelen More AES software implementations? •

Add to Reading List

Source URL: ko.stoffelen.nl

Language: English - Date: 2018-02-09 07:39:38
2All the AES You Need on Cortex-M3 and M4 Peter Schwabe and Ko Stoffelen More AES software implementations? •

All the AES You Need on Cortex-M3 and M4 Peter Schwabe and Ko Stoffelen More AES software implementations? •

Add to Reading List

Source URL: ko.stoffelen.nl

Language: English - Date: 2018-02-09 07:39:37
3A Systematic Study of Cache Side Channels across AES Implementations Heiko Mantel1 , Alexandra Weber1 , and Boris K¨opf 2 1  Computer Science Department, TU Darmstadt, Darmstadt, Germany

A Systematic Study of Cache Side Channels across AES Implementations Heiko Mantel1 , Alexandra Weber1 , and Boris K¨opf 2 1 Computer Science Department, TU Darmstadt, Darmstadt, Germany

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2017-05-18 11:37:54
    4ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

    ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

    Add to Reading List

    Source URL: www.ijmetmr.com

    Language: English - Date: 2015-06-03 03:08:26
    5Legion of the Bouncy Castle Inc. BC-FJA (Bouncy Castle FIPS Java API) Non-Proprietary FIPSCryptographic Module Security Policy Version: 0.5 Date:

    Legion of the Bouncy Castle Inc. BC-FJA (Bouncy Castle FIPS Java API) Non-Proprietary FIPSCryptographic Module Security Policy Version: 0.5 Date:

    Add to Reading List

    Source URL: www.bouncycastle.org

    Language: English - Date: 2016-08-02 22:30:34
    6International Journal of Computer Science and Applications, Technomathematics Research Foundation Vol. 13, No. 2, pp. 89 – 105, 2016 ADVANCED ENCRYPTION STANDARD ANALYSIS WITH MULTIMEDIA DATA ON INTEL® AES-NI ARCHI

    International Journal of Computer Science and Applications, Technomathematics Research Foundation Vol. 13, No. 2, pp. 89 – 105, 2016 ADVANCED ENCRYPTION STANDARD ANALYSIS WITH MULTIMEDIA DATA ON INTEL® AES-NI ARCHI

    Add to Reading List

    Source URL: www.tmrfindia.org

    Language: English
    7Legion of the Bouncy Castle Inc. BC-FJA (Bouncy Castle FIPS Java API) Non-Proprietary FIPSCryptographic Module Security Policy Version: 0.1 Date:

    Legion of the Bouncy Castle Inc. BC-FJA (Bouncy Castle FIPS Java API) Non-Proprietary FIPSCryptographic Module Security Policy Version: 0.1 Date:

    Add to Reading List

    Source URL: www.bouncycastle.org

    Language: English - Date: 2016-04-29 19:57:45
    8Legion of the Bouncy Castle Inc. BC-FJA (Bouncy Castle FIPS Java API) Non-Proprietary FIPSCryptographic Module Security Policy Version: 0.1 Date:

    Legion of the Bouncy Castle Inc. BC-FJA (Bouncy Castle FIPS Java API) Non-Proprietary FIPSCryptographic Module Security Policy Version: 0.1 Date:

    Add to Reading List

    Source URL: bouncycastle.org

    Language: English
    9Legion of the Bouncy Castle Inc. BC-FJA (Bouncy Castle FIPS Java API) User Guide Version: 0.1 Date: Legion of the Bouncy Castle Inc.

    Legion of the Bouncy Castle Inc. BC-FJA (Bouncy Castle FIPS Java API) User Guide Version: 0.1 Date: Legion of the Bouncy Castle Inc.

    Add to Reading List

    Source URL: bouncycastle.org

    Language: English - Date: 2016-04-08 19:51:32
    10Microsoft Word - Reconfig2013_cr_v01.doc

    Microsoft Word - Reconfig2013_cr_v01.doc

    Add to Reading List

    Source URL: euler.ecs.umass.edu

    Language: English - Date: 2013-11-15 15:24:17