Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "cryptographic algorithm implementation"
@article{DBLP:journals/tosem/ZhouMCRJ24, author = {Yuanhang Zhou and Fuchen Ma and Yuanliang Chen and Meng Ren and Yu Jiang}, title = {CLFuzz: Vulnerability Detection of Cryptographic Algorithm Implementation via Semantic-aware Fuzzing}, journal = {{ACM} Trans. Softw. Eng. Methodol.}, volume = {33}, number = {2}, pages = {45:1--45:28}, year = {2024}, url = {https://doi.org/10.1145/3628160}, doi = {10.1145/3628160}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosem/ZhouMCRJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/DamajAS23, author = {Issam W. Damaj and Hadi Al{-}Mubasher and Mahmoud Saadeh}, title = {An extended analytical framework for heterogeneous implementations of light cryptographic algorithms}, journal = {Future Gener. Comput. Syst.}, volume = {141}, pages = {154--172}, year = {2023}, url = {https://doi.org/10.1016/j.future.2022.11.007}, doi = {10.1016/J.FUTURE.2022.11.007}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/DamajAS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcta/SunLCSPSY23, author = {Caiban Sun and Wenrui Liu and Jiafeng Cheng and Nengyuan Sun and Zhaokang Peng and Heng Sha and Weize Yu}, title = {A high-speed and low-latency hardware implementation of {RC4} cryptographic algorithm}, journal = {Int. J. Circuit Theory Appl.}, volume = {51}, number = {12}, pages = {5980--5996}, year = {2023}, url = {https://doi.org/10.1002/cta.3769}, doi = {10.1002/CTA.3769}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcta/SunLCSPSY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cqpc/HorpenyukOV23, author = {Andriy Horpenyuk and Ivan Opirskyy and Pavlo Vorobets}, editor = {Volodymyr Sokolov and Vasyl Ustimenko and Mariya Nazarkevych}, title = {Analysis of Problems and Prospects of Implementation of Post-Quantum Cryptographic Algorithms}, booktitle = {Proceedings of the Workshop on Classic, Quantum, and Post-Quantum Cryptography {(CQPC} 2023) co-located with International Conference on Problems of Infocommunications. Science and Technology {(PICST} 2023), Kyiv, Ukraine, August 1, 2023 (online)}, series = {{CEUR} Workshop Proceedings}, volume = {3504}, pages = {39--49}, publisher = {CEUR-WS.org}, year = {2023}, url = {https://ceur-ws.org/Vol-3504/paper4.pdf}, timestamp = {Fri, 08 Dec 2023 14:24:28 +0100}, biburl = {https://dblp.org/rec/conf/cqpc/HorpenyukOV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsie/ChenL23, author = {Wenjing Chen and Jingyi Liu}, title = {Research and Implementationof National Commercial Cryptographic Algorithms}, booktitle = {Proceedings of the 8th International Conference on Cyber Security and Information Engineering, {ICCSIE} 2023, Putrajaya, Malaysia, September 22-24, 2023}, pages = {204--210}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3617184.3630133}, doi = {10.1145/3617184.3630133}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccsie/ChenL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incos/LiPW23, author = {Zimin Li and Feng Pan and Xuan Wang}, editor = {Leonard Barolli}, title = {Design and Implementation of Cryptographic Algorithm Visualization in a Virtual Pavilion Based on Unity3D}, booktitle = {Advances in Intelligent Networking and Collaborative Systems - The 15th International Conference on Intelligent Networking and Collaborative Systems, INCoS 2023, Chiang Mai, Thailand, September 6-8, 2023}, series = {Lecture Notes on Data Engineering and Communications Technologies}, volume = {182}, pages = {382--392}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-40971-4\_36}, doi = {10.1007/978-3-031-40971-4\_36}, timestamp = {Thu, 31 Aug 2023 13:41:02 +0200}, biburl = {https://dblp.org/rec/conf/incos/LiPW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/radioelektronika/GoswamiT23, author = {Sushree Sila P. Goswami and Gaurav Trivedi}, title = {Comparison of Hardware Implementations of Cryptographic Algorithms for IoT Applications}, booktitle = {33rd International Conference Radioelektronika, {RADIOELEKTRONIKA} 2023, Pardubice, Czech Republic, April 19-20, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/RADIOELEKTRONIKA57919.2023.10109046}, doi = {10.1109/RADIOELEKTRONIKA57919.2023.10109046}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/radioelektronika/GoswamiT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2301-01889, author = {Ridha Ghayoula and Jaouhar Fattahi and Amor Smida and Issam El Gmati and Emil Pricop and Marwa Ziadia}, title = {{FPGA} Implementation of {SIMON-128} Cryptographic Algorithm Using Artix-7}, journal = {CoRR}, volume = {abs/2301.01889}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2301.01889}, doi = {10.48550/ARXIV.2301.01889}, eprinttype = {arXiv}, eprint = {2301.01889}, timestamp = {Tue, 10 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2301-01889.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entropy/GuangYDWZZD22, author = {Yerui Guang and Longfei Yu and Wenjie Dong and Ya Wang and Jian Zeng and Jiayu Zhao and Qun Ding}, title = {Chaos-Based Lightweight Cryptographic Algorithm Design and {FPGA} Implementation}, journal = {Entropy}, volume = {24}, number = {11}, pages = {1610}, year = {2022}, url = {https://doi.org/10.3390/e24111610}, doi = {10.3390/E24111610}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entropy/GuangYDWZZD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecai2/GhayoulaFSGPZ22, author = {Ridha Ghayoula and Jaouhar Fattahi and Amor Smida and Issam El Gmati and Emil Pricop and Marwa Ziadia}, title = {{FPGA} Implementation of {SIMON-128} Cryptographic Algorithm Using Artix-7}, booktitle = {14th International Conference on Electronics, Computers and Artificial Intelligence, {ECAI} 2022, Ploiesti, Romania, June 30 - July 1, 2022}, pages = {1--5}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ECAI54874.2022.9847520}, doi = {10.1109/ECAI54874.2022.9847520}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecai2/GhayoulaFSGPZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpt/KamuchekaN0H22, author = {Tendayi Kamucheka and Alexander Nelson and David Andrews and Miaoqing Huang}, title = {A Masked Pure-Hardware Implementation of Kyber Cryptographic Algorithm}, booktitle = {International Conference on Field-Programmable Technology, {(IC)FPT} 2022, Hong Kong, December 5-9, 2022}, pages = {1}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICFPT56656.2022.9974404}, doi = {10.1109/ICFPT56656.2022.9974404}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fpt/KamuchekaN0H22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ftc/Hassan22, author = {Alaa Hassan}, editor = {Kohei Arai}, title = {Implementation of Lightweight Cryptographic Algorithms in IoT Devices and Sensor Networks}, booktitle = {Proceedings of the Future Technologies Conference, {FTC} 2022, Virtual Event, 20-21 October 2022, Volume 2}, series = {Lecture Notes in Networks and Systems}, volume = {560}, pages = {130--146}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-18458-1\_10}, doi = {10.1007/978-3-031-18458-1\_10}, timestamp = {Thu, 16 Mar 2023 11:22:38 +0100}, biburl = {https://dblp.org/rec/conf/ftc/Hassan22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KamuchekaNAH22, author = {Tendayi Kamucheka and Alexander Nelson and David Andrews and Miaoqing Huang}, title = {A Masked Pure-Hardware Implementation of Kyber Cryptographic Algorithm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1547}, year = {2022}, url = {https://eprint.iacr.org/2022/1547}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/KamuchekaNAH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/hal/Besson21, author = {Lo{\"{\i}}c Besson}, title = {Design, analysis and implementation of cryptographic symmetric encryption algorithms on {FPGA.} (Conception, analyse et impl{\'{e}}mentation d'algorithmes de chiffrement sym{\'{e}}trique sur {FPGA)}}, school = {University of Paris-Saclay, France}, year = {2021}, url = {https://tel.archives-ouvertes.fr/tel-03526551}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/hal/Besson21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/hal/MathieuMahias21, author = {Axel Mathieu{-}Mahias}, title = {Securisation of implementations of cryptographic algorithms in the context of embedded systems. (S{\'{e}}curisation des impl{\'{e}}mentations d'algorithmes cryptographiques pour les syst{\`{e}}mes embarqu{\'{e}}s)}, school = {University of Paris-Saclay, France}, year = {2021}, url = {https://tel.archives-ouvertes.fr/tel-03537322}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/hal/MathieuMahias21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhouHZC21, author = {Yukun Zhou and Baidong Hu and Yitao Zhang and Weiming Cai}, title = {Implementation of Cryptographic Algorithm in Dynamic {QR} Code Payment System and Its Performance}, journal = {{IEEE} Access}, volume = {9}, pages = {122362--122372}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3108189}, doi = {10.1109/ACCESS.2021.3108189}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ZhouHZC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmemcom/GanbaatarNCI21, author = {Ganbat Ganbaatar and Dugar Nyamdorj and Gordon Cichon and Tseren{-}Onolt Ishdorj}, title = {Implementation of {RSA} cryptographic algorithm using {SN} {P} systems based on {HP/LP} neurons}, journal = {J. Membr. Comput.}, volume = {3}, number = {1}, pages = {22--34}, year = {2021}, url = {https://doi.org/10.1007/s41965-021-00073-3}, doi = {10.1007/S41965-021-00073-3}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmemcom/GanbaatarNCI21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2110-13407, author = {Favin Fernandes and Gauravi Dungarwal and Aishwariya Gaikwad and Ishan Kareliya and Swati Shilaskar}, title = {{VLSI} Implementation of Cryptographic Algorithms {\&} Techniques: {A} Literature Review}, journal = {CoRR}, volume = {abs/2110.13407}, year = {2021}, url = {https://arxiv.org/abs/2110.13407}, eprinttype = {arXiv}, eprint = {2110.13407}, timestamp = {Thu, 28 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2110-13407.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/hal/Sleem20, author = {Lama Sleem}, title = {Design and implementation of lightweight and secure cryptographic algorithms for embedded devices. (Conception et impl{\'{e}}mentation d'algorithmes cryptographiques l{\'{e}}gers et s{\'{e}}curis{\'{e}}s pour dispositifs embarqu{\'{e}}s)}, school = {University of Burgundy Franche-Comt{\'{e}}, France}, year = {2020}, url = {https://tel.archives-ouvertes.fr/tel-03101356}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/phd/hal/Sleem20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/tr/Aslan20, author = {F{\"{u}}sun Yavuzer Aslan}, title = {Nesnelerin interneti uygulamalar{\i}n{\i}n g{\"{u}}venli{\u{g}}i i{\c{c}}in hafif s{\i}klet kriptografik algoritmalar{\i}n analizi ve g{\"{u}}venli ak{\i}ll{\i} bir platform uygulamas{\i} (Analysis of lightweight cryptographic algorithms for iot security and implementation of a secure smart platform)}, school = {Trakya University, Turkey}, year = {2020}, url = {https://tez.yok.gov.tr/UlusalTezMerkezi/tezDetay.jsp?id=\_Ervxj53G0z2QXM7x4kepA\&no=ru4gpuM4TdHLXeqRKHO9Lw}, timestamp = {Sun, 29 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/tr/Aslan20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ewdts/SafaryanRCPLA20, author = {Olga A. Safaryan and Evgenia V. Roshchina and Larissa V. Cherckesova and Elena V. Pinevich and Andrey G. Lobodenko and Boris A. Akishin}, title = {Cryptographic Algorithm Implementation for Data Encryption in {DBMS} {MS} {SQL} Server}, booktitle = {{IEEE} East-West Design {\&} Test Symposium, {EWDTS} 2020, Varna, Bulgaria, September 4-7, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/EWDTS50664.2020.9224775}, doi = {10.1109/EWDTS50664.2020.9224775}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ewdts/SafaryanRCPLA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tencon/TorrenoLRB20, author = {Alexis Czezar Cruz Torreno and Maria Theresa Gusad de Leon and Marc Driz Rosales and Anastacia Ballesil{-}Alvarez}, title = {Power and Area Oriented Implementations of Lightweight Cryptographic Algorithms for Wireless Sensor Networks}, booktitle = {2020 {IEEE} Region 10 Conference, {TENCON} 2020, Osaka, Japan, November 16-19, 2020}, pages = {473--477}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/TENCON50793.2020.9293929}, doi = {10.1109/TENCON50793.2020.9293929}, timestamp = {Thu, 28 Jan 2021 11:14:07 +0100}, biburl = {https://dblp.org/rec/conf/tencon/TorrenoLRB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/meco/RihaKN19, author = {Jan R{\'{\i}}ha and Jakub Klemsa and Martin Novotn{\'{y}}}, title = {Multiprecision {ANSI} {C} Library for Implementation of Cryptographic Algorithms on Microcontrollers}, booktitle = {8th Mediterranean Conference on Embedded Computing, {MECO} 2019, Budva, Montenegro, June 10-14, 2019}, pages = {1--4}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/MECO.2019.8760285}, doi = {10.1109/MECO.2019.8760285}, timestamp = {Mon, 09 Aug 2021 14:54:01 +0200}, biburl = {https://dblp.org/rec/conf/meco/RihaKN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/it/Mella18, author = {Silvia Mella}, title = {Analysis of cryptographic algorithms against theoretical and implementation attacks}, school = {University of Milan, Italy}, year = {2018}, url = {https://opac.bncf.firenze.sbn.it/bncf-prod/resource?uri=TD18003044}, timestamp = {Sat, 06 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/it/Mella18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcbb/BogdanovKLS18, author = {Dan Bogdanov and Liina Kamm and Sven Laur and Ville Sokk}, title = {Implementation and Evaluation of an Algorithm for Cryptographically Private Principal Component Analysis on Genomic Data}, journal = {{IEEE} {ACM} Trans. Comput. Biol. Bioinform.}, volume = {15}, number = {5}, pages = {1427--1432}, year = {2018}, url = {https://doi.org/10.1109/TCBB.2018.2858818}, doi = {10.1109/TCBB.2018.2858818}, timestamp = {Mon, 03 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcbb/BogdanovKLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vdat/RaveendranDP18, author = {Abhimanniu Raveendran and Sanjay B. Dhok and Rajendra M. Patrikar}, editor = {S. Rajaram and N. B. Balamurugan and D. Gracia Nirmala Rani and Virendra Singh}, title = {High Level Synthesis and Implementation of Cryptographic Algorithm in {AHIR} Platform}, booktitle = {{VLSI} Design and Test - 22nd International Symposium, {VDAT} 2018, Madurai, India, June 28-30, 2018, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {892}, pages = {16--27}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-981-13-5950-7\_2}, doi = {10.1007/978-981-13-5950-7\_2}, timestamp = {Wed, 04 May 2022 16:21:48 +0200}, biburl = {https://dblp.org/rec/conf/vdat/RaveendranDP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HouBZL18, author = {Xiaolu Hou and Jakub Breier and Fuyuan Zhang and Yang Liu}, title = {Fully Automated Differential Fault Analysis on Software Implementations of Cryptographic Algorithms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {545}, year = {2018}, url = {https://eprint.iacr.org/2018/545}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HouBZL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asicon/LiuYL17, author = {Min Liu and Ying Jian Yan and Wei Li}, editor = {Yajie Qin and Zhiliang Hong and Ting{-}Ao Tang}, title = {Implementation and optimization of {A5-1} algorithm on coarse-grained reconfigurable cryptographic logic array}, booktitle = {12th {IEEE} International Conference on ASIC, {ASICON} 2017, Guiyang, China, October 25-28, 2017}, pages = {279--282}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ASICON.2017.8252467}, doi = {10.1109/ASICON.2017.8252467}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/asicon/LiuYL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsc/CiSYDLM17, author = {Yunfei Ci and Guozhen Shi and Feng Yang and Jiawen Diao and Cuijie Liu and Weihua Mao}, title = {Design and Implementation of the Components of the Symmetric Cryptographic Algorithm}, booktitle = {Second {IEEE} International Conference on Data Science in Cyberspace, {DSC} 2017, Shenzhen, China, June 26-29, 2017}, pages = {483--487}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/DSC.2017.23}, doi = {10.1109/DSC.2017.23}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsc/CiSYDLM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsc/ShiZY17, author = {Yu Shi and Dong Zheng and Chung{-}Huang Yang}, title = {The Efficient Implementation of the Android Kernel with China Standard Cryptographic Algorithm}, booktitle = {Second {IEEE} International Conference on Data Science in Cyberspace, {DSC} 2017, Shenzhen, China, June 26-29, 2017}, pages = {421--425}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/DSC.2017.86}, doi = {10.1109/DSC.2017.86}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsc/ShiZY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpec/ZhouEJ17, author = {Boyou Zhou and Manuel Egele and Ajay Joshi}, title = {High-performance low-energy implementation of cryptographic algorithms on a programmable SoC for IoT devices}, booktitle = {2017 {IEEE} High Performance Extreme Computing Conference, {HPEC} 2017, Waltham, MA, USA, September 12-14, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/HPEC.2017.8091062}, doi = {10.1109/HPEC.2017.8091062}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hpec/ZhouEJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc8221, author = {Paul Wouters and Daniel Migault and John Preu{\ss} Mattsson and Yoav Nir and Tero Kivinen}, title = {Cryptographic Algorithm Implementation Requirements and Usage Guidance for Encapsulating Security Payload {(ESP)} and Authentication Header {(AH)}}, journal = {{RFC}}, volume = {8221}, pages = {1--15}, year = {2017}, url = {https://doi.org/10.17487/RFC8221}, doi = {10.17487/RFC8221}, timestamp = {Fri, 22 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc8221.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/hal/Robert15, author = {Jean{-}Marc Robert}, title = {Contrer l'attaque Simple Power Analysis efficacement dans les applications de la cryptographie asym{\'{e}}trique, algorithmes et implantations. (Thwart simple power analysis efficiently in asymmetric cryptographic applications, algorithms and implementations)}, school = {University of Perpignan, France}, year = {2015}, url = {https://tel.archives-ouvertes.fr/tel-01269753}, timestamp = {Tue, 21 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/hal/Robert15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/hal/Zeitoun15, author = {Rina Zeitoun}, title = {Algebraic methods for security analysis of cryptographic algorithms implementations. (M{\'{e}}thodes alg{\'{e}}briques pour l'analyse de s{\'{e}}curit{\'{e}} des implantations d'algorithmes cryptographiques)}, school = {Pierre and Marie Curie University, Paris, France}, year = {2015}, url = {https://tel.archives-ouvertes.fr/tel-01254443}, timestamp = {Tue, 21 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/hal/Zeitoun15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/RaoRV15, author = {Pallipamu Venkateswara Rao and K. Thammi Reddy and P. Suresh Varma}, title = {{ASH-512:} Design and implementation of cryptographic hash algorithm using co-ordinate geometry concepts}, journal = {J. Inf. Secur. Appl.}, volume = {20}, pages = {47--60}, year = {2015}, url = {https://doi.org/10.1016/j.jisa.2014.10.006}, doi = {10.1016/J.JISA.2014.10.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/RaoRV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/depcos/Sugier15, author = {Jaroslaw Sugier}, editor = {Wojciech Zamojski and Jacek Mazurkiewicz and Jaroslaw Sugier and Tomasz Walkowiak and Janusz Kacprzyk}, title = {Popular {FPGA} Device Families in Implementation of Cryptographic Algorithms}, booktitle = {Theory and Engineering of Complex Systems and Dependability - Proceedings of the Tenth International Conference on Dependability and Complex Systems DepCoS-RELCOMEX, June 29 - July 3 2015, Brun{\'{o}}w, Poland}, series = {Advances in Intelligent Systems and Computing}, volume = {365}, pages = {485--494}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19216-1\_46}, doi = {10.1007/978-3-319-19216-1\_46}, timestamp = {Sat, 19 Oct 2019 20:27:57 +0200}, biburl = {https://dblp.org/rec/conf/depcos/Sugier15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpcc/GuoQZ15, author = {Guang{-}liang Guo and Quan Qian and Rui Zhang}, title = {Different Implementations of {AES} Cryptographic Algorithm}, booktitle = {17th {IEEE} International Conference on High Performance Computing and Communications, {HPCC} 2015, 7th {IEEE} International Symposium on Cyberspace Safety and Security, {CSS} 2015, and 12th {IEEE} International Conference on Embedded Software and Systems, {ICESS} 2015, New York, NY, USA, August 24-26, 2015}, pages = {1848--1853}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/HPCC-CSS-ICESS.2015.215}, doi = {10.1109/HPCC-CSS-ICESS.2015.215}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/hpcc/GuoQZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vlsisp/SchneiderMGO14, author = {Tobias Schneider and Ingo von Maurich and Tim G{\"{u}}neysu and David F. Oswald}, title = {Cryptographic Algorithms on the {GA144} Asynchronous Multi-Core Processor - Implementation and Side-Channel Analysis}, journal = {J. Signal Process. Syst.}, volume = {77}, number = {1-2}, pages = {151--167}, year = {2014}, url = {https://doi.org/10.1007/s11265-014-0872-5}, doi = {10.1007/S11265-014-0872-5}, timestamp = {Thu, 07 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/vlsisp/SchneiderMGO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isccsp/AthanasiouMT14, author = {George Athanasiou and George{-}Paris Makkas and Georgios Theodoridis}, title = {High throughput pipelined {FPGA} implementation of the new {SHA-3} cryptographic hash algorithm}, booktitle = {6th International Symposium on Communications, Control and Signal Processing, {ISCCSP} 2014, Athens, Greece, May 21-23, 2014}, pages = {538--541}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISCCSP.2014.6877931}, doi = {10.1109/ISCCSP.2014.6877931}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/isccsp/AthanasiouMT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc7321, author = {David A. McGrew and Paul E. Hoffman}, title = {Cryptographic Algorithm Implementation Requirements and Usage Guidance for Encapsulating Security Payload {(ESP)} and Authentication Header {(AH)}}, journal = {{RFC}}, volume = {7321}, pages = {1--11}, year = {2014}, url = {https://doi.org/10.17487/RFC7321}, doi = {10.17487/RFC7321}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc7321.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/YuliantoP13, author = {Aditya Yulianto and Maria Irmina Prasetiyowati}, title = {BoxLock: Mobile-based Serpent cryptographic algorithm and One-Time Password mechanism implementation for Dropbox files security}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {357--362}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750222}, doi = {10.1109/ICITST.2013.6750222}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/YuliantoP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/Savas13, author = {Erkay Savas}, editor = {Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Oleg B. Makarevich}, title = {Attacks on implementations of cryptographic algorithms: side-channel and fault attacks}, booktitle = {The 6th International Conference on Security of Information and Networks, {SIN} '13, Aksaray, Turkey, November 26-28, 2013}, pages = {7--14}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2523514.2523593}, doi = {10.1145/2523514.2523593}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/Savas13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/KaraklajicFV12, author = {Dusko Karaklajic and Junfeng Fan and Ingrid Verbauwhede}, title = {A systematic {M} safe-error detection in hardware implementations of cryptographic algorithms}, booktitle = {2012 {IEEE} International Symposium on Hardware-Oriented Security and Trust, {HOST} 2012, San Francisco, CA, USA, June 3-4, 2012}, pages = {96--101}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/HST.2012.6224327}, doi = {10.1109/HST.2012.6224327}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/KaraklajicFV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/basesearch/Kizhvatov11, author = {Ilya Kizhvatov}, title = {Physical Security of Cryptographic Algorithm Implementations}, school = {University of Luxembourg}, year = {2011}, url = {http://orbilu.uni.lu/handle/10993/15446}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/basesearch/Kizhvatov11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AbdelhalimEAE11, author = {Mohamed B. Abdelhalim and Mohamed S. El{-}Mahallawy and M. Ayyad and Adel ElHennawy}, title = {Implementation of a modified lightweight cryptographic {TEA} algorithm in {RFID} system}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {509--513}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148491/}, timestamp = {Sun, 27 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AbdelhalimEAE11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc6094, author = {Manav Bhatia and Vishwas Manral}, title = {Summary of Cryptographic Authentication Algorithm Implementation Requirements for Routing Protocols}, journal = {{RFC}}, volume = {6094}, pages = {1--11}, year = {2011}, url = {https://doi.org/10.17487/RFC6094}, doi = {10.17487/RFC6094}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc6094.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/riga/NazarukR10, author = {Vladislav Nazaruk and Pavel Rusakov}, title = {Implementation of Cryptographic Algorithms in Software: An Analysis of the Effectiveness}, journal = {Sci. J. Riga Tech. Univ. Ser. Comput. Sci.}, volume = {41}, pages = {97--105}, year = {2010}, url = {https://doi.org/10.2478/v10143-010-0030-x}, doi = {10.2478/V10143-010-0030-X}, timestamp = {Wed, 24 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/riga/NazarukR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/FanGLH10, author = {Xinxin Fan and Guang Gong and Ken Lauffenburger and Troy Hicks}, editor = {Jim Plusquellic and Ken Mai}, title = {{FPGA} Implementations of the Hummingbird Cryptographic Algorithm}, booktitle = {{HOST} 2010, Proceedings of the 2010 {IEEE} International Symposium on Hardware-Oriented Security and Trust (HOST), 13-14 June 2010, Anaheim Convention Center, California, {USA}}, pages = {48--51}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/HST.2010.5513116}, doi = {10.1109/HST.2010.5513116}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/FanGLH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccd/MansouriD10, author = {Shohreh Sharif Mansouri and Elena Dubrova}, title = {Pulse latch based FSRs for low-overhead hardware implementation of cryptographic algorithms}, booktitle = {28th International Conference on Computer Design, {ICCD} 2010, 3-6 October 2010, Amsterdam, The Netherlands, Proceedings}, pages = {253--259}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ICCD.2010.5647756}, doi = {10.1109/ICCD.2010.5647756}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccd/MansouriD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnis/ZhangLWW10, author = {Luguo Zhang and Zheng Li and Ruijiao Wang and Shengjun Wen}, title = {Design and implementation of multiple cryptographic algorithm interface circuit based on secure SoC}, booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications, Networking and Information Security, {WCNIS} 2010, 25-27 June 2010, Beijing, China}, pages = {510--514}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/WCINS.2010.5541831}, doi = {10.1109/WCINS.2010.5541831}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/wcnis/ZhangLWW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SanA10, author = {Ismail San and Nuray At}, title = {Enhanced {FPGA} Implementation of the Hummingbird Cryptographic Algorithm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {586}, year = {2010}, url = {http://eprint.iacr.org/2010/586}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SanA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpl/VelegalatiK09, author = {Rajesh Velegalati and Jens{-}Peter Kaps}, editor = {Martin Danek and Jiri Kadlec and Brent E. Nelson}, title = {{DPA} resistance for light-weight implementations of cryptographic algorithms on FPGAs}, booktitle = {19th International Conference on Field Programmable Logic and Applications, {FPL} 2009, August 31 - September 2, 2009, Prague, Czech Republic}, pages = {385--390}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/FPL.2009.5272260}, doi = {10.1109/FPL.2009.5272260}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/fpl/VelegalatiK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/FanHGSE09, author = {Xinxin Fan and Honggang Hu and Guang Gong and Eric M. Smith and Daniel W. Engels}, title = {Lightweight implementation of Hummingbird cryptographic algorithm on 4-bit microcontrollers}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--7}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402515}, doi = {10.1109/ICITST.2009.5402515}, timestamp = {Mon, 09 Aug 2021 17:01:45 +0200}, biburl = {https://dblp.org/rec/conf/icitst/FanHGSE09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iih-msp/ZhangDD08, author = {Dawei Zhang and Wenrui Ding and Ding Ding}, editor = {Jeng{-}Shyang Pan and Xiamu Niu and Hsiang{-}Cheh Huang and Lakhmi C. Jain}, title = {Fast Implementation of {SMS4} Cryptographic Algorithms on Smart Card}, booktitle = {4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing {(IIH-MSP} 2008), Harbin, China, 15-17 August 2008, Proceedings}, pages = {287--290}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IIH-MSP.2008.179}, doi = {10.1109/IIH-MSP.2008.179}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iih-msp/ZhangDD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/basesearch/MeuricedeDormale07, author = {Guerric Meurice de Dormale}, title = {Destructive and constructive aspects of efficient algorithms and implementation of cryptographic hardware}, school = {Catholic University of Louvain, Louvain-la-Neuve, Belgium}, year = {2007}, url = {https://hdl.handle.net/2078.1/5049}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/basesearch/MeuricedeDormale07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc4835, author = {Vishwas Manral}, title = {Cryptographic Algorithm Implementation Requirements for Encapsulating Security Payload {(ESP)} and Authentication Header {(AH)}}, journal = {{RFC}}, volume = {4835}, pages = {1--10}, year = {2007}, url = {https://doi.org/10.17487/RFC4835}, doi = {10.17487/RFC4835}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc4835.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secperu/MarkovicD06, author = {Milan Markovic and Goran Dordevic}, title = {On Implementation Aspects of Standard Asymmetric and Symmetric Cryptographic Algorithms on {TI} Signal Processors}, booktitle = {Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2006), 29 June 2006, Lyon, France}, pages = {57--62}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/SECPERU.2006.12}, doi = {10.1109/SECPERU.2006.12}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secperu/MarkovicD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc4305, author = {Donald E. Eastlake III}, title = {Cryptographic Algorithm Implementation Requirements for Encapsulating Security Payload {(ESP)} and Authentication Header {(AH)}}, journal = {{RFC}}, volume = {4305}, pages = {1--9}, year = {2005}, url = {https://doi.org/10.17487/RFC4305}, doi = {10.17487/RFC4305}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc4305.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cau/BrownDN04, author = {Jaimee Brown and Ed Dawson and Juan Manuel Gonz{\'{a}}lez Nieto}, editor = {Ed Dawson and Wolfgang Klemm}, title = {Implementation of the {GBD} Cryptosystem}, booktitle = {Cryptographic Algorithms and their Uses - 2004, International Workshop, Gold Coast, Australia, July 5-6, 2004, Proceedings}, pages = {94--109}, publisher = {Queensland University of Technology}, year = {2004}, timestamp = {Fri, 16 Jul 2004 13:22:45 +0200}, biburl = {https://dblp.org/rec/conf/cau/BrownDN04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cau/HenricksenYF04, author = {Matthew Henricksen and Ming Yao and Ernest Foo}, editor = {Ed Dawson and Wolfgang Klemm}, title = {An Implementation of the Yao Forward Integrity Protocol for Mobile Agents}, booktitle = {Cryptographic Algorithms and their Uses - 2004, International Workshop, Gold Coast, Australia, July 5-6, 2004, Proceedings}, pages = {110--124}, publisher = {Queensland University of Technology}, year = {2004}, timestamp = {Fri, 16 Jul 2004 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cau/HenricksenYF04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpl/GonzalezLGM03, author = {Iv{\'{a}}n Gonz{\'{a}}lez and Sergio L{\'{o}}pez{-}Buedo and Francisco J. G{\'{o}}mez and Javier Mart{\'{\i}}nez}, editor = {Peter Y. K. Cheung and George A. Constantinides and Jos{\'{e}} T. de Sousa}, title = {Using Partial Reconfiguration in Cryptographic Applications: An Implementation of the {IDEA} Algorithm}, booktitle = {Field Programmable Logic and Application, 13th International Conference, {FPL} 2003, Lisbon, Portugal, September 1-3, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2778}, pages = {194--203}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45234-8\_20}, doi = {10.1007/978-3-540-45234-8\_20}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/fpl/GonzalezLGM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpl/HamalainenTS02, author = {Antti H{\"{a}}m{\"{a}}l{\"{a}}inen and Matti Tommiska and Jorma Skytt{\"{a}}}, editor = {Manfred Glesner and Peter Zipf and Michel Renovell}, title = {8 Gigabits per Second Implementation of the {IDEA} Cryptographic Algorithm}, booktitle = {Field-Programmable Logic and Applications, Reconfigurable Computing Is Going Mainstream, 12th International Conference, {FPL} 2002, Montpellier, France, September 2-4, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2438}, pages = {760--769}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-46117-5\_78}, doi = {10.1007/3-540-46117-5\_78}, timestamp = {Sat, 30 Sep 2023 09:41:27 +0200}, biburl = {https://dblp.org/rec/conf/fpl/HamalainenTS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isspa/ShamsuddinBG01, author = {Shuhaimi bin Shamsuddin and Mohd Dani bin Baba and Deepak K. Ghodgaonkar}, title = {Implementation of cryptographic algorithms for radio telemetry using LabVIEW}, booktitle = {Proceedings of the Sixth International Symposium on Signal Processing and its Applications, {ISSPA} 2001, August 13-16 2001, Shmgri-La Hotel, Kuala Lumpur, Malaysia}, pages = {749--750}, publisher = {{IEEE}}, year = {2001}, url = {https://doi.org/10.1109/ISSPA.2001.950260}, doi = {10.1109/ISSPA.2001.950260}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isspa/ShamsuddinBG01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sbcci/SalomaoF98, author = {S. Salom{\~{a}}o and V. Alves and E. Filho}, title = {A Two-level Pipelined Implementation of the {IDEA} Cryptographic Algorithm}, booktitle = {Proceedings of the 11th Annual Symposium on Integrated Circuits Design, {SBCCI} 1998, Rio de Janiero, Brazil, September 30 - October 2, 1998}, pages = {158--161}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.ieeecomputersociety.org/10.1109/SBCCI.1998.715431}, doi = {10.1109/SBCCI.1998.715431}, timestamp = {Thu, 26 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sbcci/SalomaoF98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.