Advanced Encryption Standard

Results: 1268



#Item
291Elliptic curve cryptography / Reconfigurable computing / Power analysis / Side channel attack / Multiplication / Field-programmable gate array / Advanced Encryption Standard / Elliptic curve point multiplication / Xilinx / Cryptography / Mathematics / Espionage

Individualizing Electrical Circuits of Cryptographic Devices as a Means to Hinder Tampering Attacks Zoya Dyka, Thomas Basmer, Christian Wittke and Peter Langendoerfer System dept., IHP Frankfurt(Oder), Germany

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-08 10:18:14
292Block cipher / DES-X / Differential cryptanalysis / S-box / Key size / Triple DES / Key schedule / Advanced Encryption Standard / Advantage / Cryptography / Data Encryption Standard / ICE

Chapter 2 Block Ciphers Blockciphers are the central tool in the design of protocols for shared-key cryptography (aka. symmetric) cryptography. They are the main available “technology” we have at our disposal. This c

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-20 20:41:13
293Stream ciphers / Cryptographic hash functions / Advanced Encryption Standard / Hamming weight / Py / Lookup table / Cryptography / Keccak / NIST hash function competition

Side-Channel Analysis of MAC-Keccak Hardware Implementations Pei Luo1 , Yunsi Fei1 , Xin Fang1 , A. Adam Ding2 , David R. Kaeli1 , and Miriam Leeser1 1 Department of Electrical and Computer Engineering, Northeastern Uni

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-30 21:07:24
294Hashing / NIST hash function competition / Advanced Encryption Standard / GOST / Block cipher / Data Encryption Standard / Grøstl / VEST / Whirlpool / Cryptography / Cryptographic hash functions / GOST standards

STRIBOB / WHIRLBOB Security Analysis Addendum Last update: Tuesday 5th May, 2015 Markku-Juhani O. Saarinen Tampere University of Technology

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-05 15:45:44
295Linear cryptanalysis / Differential cryptanalysis / ICE / Authenticated encryption / Stream ciphers / Cryptography / Advanced Encryption Standard / Block cipher

Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware Beg¨ ul Bilgin1,2 , Andrey Bogdanov3 , Miroslav Kneˇzevi´c4 , Florian Mendel5 , and Qingju Wang1,6 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-04 16:35:21
296Substitution cipher / Ciphertext / Cipher / Keystream / ICE / Cryptography / Stream ciphers / Advanced Encryption Standard

Whitenoise Laboratories Inc. Software Specifications For Tinnitus Utilizing Whitenoise Substitution

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-02-25 12:31:39
297Cryptanalysis / Integral cryptanalysis / ICE / Camellia / Truncated differential cryptanalysis / Chosen-plaintext attack / Advanced Encryption Standard / Key schedule / Block cipher / Cryptography / Differential cryptanalysis / Impossible differential cryptanalysis

ImprovedIDCofCamellia-192-256_v_8_13_springer.dvi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-22 00:23:21
298Secure multi-party computation / Secret sharing / Finite fields / XTR / Cryptography / Cryptographic protocols / Advanced Encryption Standard

Secure Multiparty AES (full paper) Ivan Damg˚ ard and Marcel Keller Dept. of Computer Science, Aarhus University, Denmark {ivan,mkeller}@cs.au.dk

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-11 11:55:52
299Identity management / Advanced Encryption Standard / EMC Corporation / SecurID / Password / Multi-factor authentication / Authentication / Transaction authentication number / Phishing / Security / Computer security / Access control

Microsoft Word - CASQUE Paper.docx

Add to Reading List

Source URL: www.casque.co.uk

Language: English - Date: 2013-10-03 11:34:52
300Central processing unit / Computer memory / Computing / Advanced Encryption Standard / CPU cache / Side channel attack / Timing attack / Hyper-V / Cryptography / Cache / Computer hardware

Wait a minute! A fast, Cross-VM attack on AES Gorka Irazoqui, Mehmet Sinan Inci, Thomas Eisenbarth, and Berk Sunar Worcester Polytechnic Institute, Worcester, MA, USA {girazoki,msinci,teisenbarth,sunar}@wpi.edu Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-11-20 16:16:58
UPDATE