12 papers:
- DAC-2015-BeaulieuSSTWW #lightweight
- The SIMON and SPECK lightweight block ciphers (RB, DS, JS, STC, BW, LW), p. 6.
- DATE-2015-JovanovicP #product line
- Fault-based attacks on the Bel-T block cipher family (PJ, IP), pp. 601–604.
- ITiCSE-2015-LiMTMSKW #named #visualisation
- VIGvisual: A Visualization Tool for the Vigenère Cipher (CL, JM, JT, JM, CKS, MSK, CW), pp. 129–134.
- DAC-2014-RudraDNH #case study #design #logic
- Designing Stealthy Trojans with Sequential Logic: A Stream Cipher Case Study (MRR, NAD, VN, DHKH), p. 4.
- DAC-2014-ShanSFZTXYL #algorithm #analysis #configuration management #encryption #multi
- A Side-channel Analysis Resistant Reconfigurable Cryptographic Coprocessor Supporting Multiple Block Cipher Algorithms (WS, LS, XF, XZ, CT, ZX, JY, JL), p. 6.
- STOC-2011-HolensteinKT #equivalence #random #revisited
- The equivalence of the random oracle model and the ideal cipher model, revisited (TH, RK, ST), pp. 89–98.
- ECMFA-2010-Balderas-ContrerasGC #algorithm #uml
- A UML 2.0 Profile to Model Block Cipher Algorithms (TBC, GRG, RC), pp. 20–31.
- DATE-2009-Dubrova #how
- How to speed-up your NLFSR-based stream cipher (ED), pp. 878–881.
- DATE-2009-HenzenCFF #evaluation #hardware
- Hardware evaluation of the stream cipher-based hash functions RadioGatún and irRUPT (LH, FC, NF, WF), pp. 646–651.
- DATE-2007-GrossschadlTRHM #constraints #energy #evaluation #implementation #memory management
- Energy evaluation of software implementations of block ciphers under memory constraints (JG, ST, CR, MH, MM), pp. 1110–1115.
- SAC-2007-KimHC #implementation #mobile #multi #performance
- An efficient implementation of RC4 cipher for encrypting multimedia files on mobile devices (HK, JH, SC), pp. 1171–1175.
- DAC-2001-KarriWMK #concurrent #detection #fault #symmetry
- Concurrent Error Detection of Fault-Based Side-Channel Cryptanalysis of 128-Bit Symmetric Block Ciphers (RK, KW, PM, YK), pp. 579–585.