Search dblp for Publications

export results for "cryptographic algorithm implementation"

 download as .bib file

@article{DBLP:journals/tosem/ZhouMCRJ24,
  author       = {Yuanhang Zhou and
                  Fuchen Ma and
                  Yuanliang Chen and
                  Meng Ren and
                  Yu Jiang},
  title        = {CLFuzz: Vulnerability Detection of Cryptographic Algorithm Implementation
                  via Semantic-aware Fuzzing},
  journal      = {{ACM} Trans. Softw. Eng. Methodol.},
  volume       = {33},
  number       = {2},
  pages        = {45:1--45:28},
  year         = {2024},
  url          = {https://doi.org/10.1145/3628160},
  doi          = {10.1145/3628160},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosem/ZhouMCRJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/DamajAS23,
  author       = {Issam W. Damaj and
                  Hadi Al{-}Mubasher and
                  Mahmoud Saadeh},
  title        = {An extended analytical framework for heterogeneous implementations
                  of light cryptographic algorithms},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {141},
  pages        = {154--172},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.future.2022.11.007},
  doi          = {10.1016/J.FUTURE.2022.11.007},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/DamajAS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcta/SunLCSPSY23,
  author       = {Caiban Sun and
                  Wenrui Liu and
                  Jiafeng Cheng and
                  Nengyuan Sun and
                  Zhaokang Peng and
                  Heng Sha and
                  Weize Yu},
  title        = {A high-speed and low-latency hardware implementation of {RC4} cryptographic
                  algorithm},
  journal      = {Int. J. Circuit Theory Appl.},
  volume       = {51},
  number       = {12},
  pages        = {5980--5996},
  year         = {2023},
  url          = {https://doi.org/10.1002/cta.3769},
  doi          = {10.1002/CTA.3769},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcta/SunLCSPSY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cqpc/HorpenyukOV23,
  author       = {Andriy Horpenyuk and
                  Ivan Opirskyy and
                  Pavlo Vorobets},
  editor       = {Volodymyr Sokolov and
                  Vasyl Ustimenko and
                  Mariya Nazarkevych},
  title        = {Analysis of Problems and Prospects of Implementation of Post-Quantum
                  Cryptographic Algorithms},
  booktitle    = {Proceedings of the Workshop on Classic, Quantum, and Post-Quantum
                  Cryptography {(CQPC} 2023) co-located with International Conference
                  on Problems of Infocommunications. Science and Technology {(PICST}
                  2023), Kyiv, Ukraine, August 1, 2023 (online)},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {3504},
  pages        = {39--49},
  publisher    = {CEUR-WS.org},
  year         = {2023},
  url          = {https://ceur-ws.org/Vol-3504/paper4.pdf},
  timestamp    = {Fri, 08 Dec 2023 14:24:28 +0100},
  biburl       = {https://dblp.org/rec/conf/cqpc/HorpenyukOV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsie/ChenL23,
  author       = {Wenjing Chen and
                  Jingyi Liu},
  title        = {Research and Implementationof National Commercial Cryptographic Algorithms},
  booktitle    = {Proceedings of the 8th International Conference on Cyber Security
                  and Information Engineering, {ICCSIE} 2023, Putrajaya, Malaysia, September
                  22-24, 2023},
  pages        = {204--210},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3617184.3630133},
  doi          = {10.1145/3617184.3630133},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccsie/ChenL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incos/LiPW23,
  author       = {Zimin Li and
                  Feng Pan and
                  Xuan Wang},
  editor       = {Leonard Barolli},
  title        = {Design and Implementation of Cryptographic Algorithm Visualization
                  in a Virtual Pavilion Based on Unity3D},
  booktitle    = {Advances in Intelligent Networking and Collaborative Systems - The
                  15th International Conference on Intelligent Networking and Collaborative
                  Systems, INCoS 2023, Chiang Mai, Thailand, September 6-8, 2023},
  series       = {Lecture Notes on Data Engineering and Communications Technologies},
  volume       = {182},
  pages        = {382--392},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-40971-4\_36},
  doi          = {10.1007/978-3-031-40971-4\_36},
  timestamp    = {Thu, 31 Aug 2023 13:41:02 +0200},
  biburl       = {https://dblp.org/rec/conf/incos/LiPW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/radioelektronika/GoswamiT23,
  author       = {Sushree Sila P. Goswami and
                  Gaurav Trivedi},
  title        = {Comparison of Hardware Implementations of Cryptographic Algorithms
                  for IoT Applications},
  booktitle    = {33rd International Conference Radioelektronika, {RADIOELEKTRONIKA}
                  2023, Pardubice, Czech Republic, April 19-20, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/RADIOELEKTRONIKA57919.2023.10109046},
  doi          = {10.1109/RADIOELEKTRONIKA57919.2023.10109046},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/radioelektronika/GoswamiT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2301-01889,
  author       = {Ridha Ghayoula and
                  Jaouhar Fattahi and
                  Amor Smida and
                  Issam El Gmati and
                  Emil Pricop and
                  Marwa Ziadia},
  title        = {{FPGA} Implementation of {SIMON-128} Cryptographic Algorithm Using
                  Artix-7},
  journal      = {CoRR},
  volume       = {abs/2301.01889},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2301.01889},
  doi          = {10.48550/ARXIV.2301.01889},
  eprinttype    = {arXiv},
  eprint       = {2301.01889},
  timestamp    = {Tue, 10 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2301-01889.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entropy/GuangYDWZZD22,
  author       = {Yerui Guang and
                  Longfei Yu and
                  Wenjie Dong and
                  Ya Wang and
                  Jian Zeng and
                  Jiayu Zhao and
                  Qun Ding},
  title        = {Chaos-Based Lightweight Cryptographic Algorithm Design and {FPGA}
                  Implementation},
  journal      = {Entropy},
  volume       = {24},
  number       = {11},
  pages        = {1610},
  year         = {2022},
  url          = {https://doi.org/10.3390/e24111610},
  doi          = {10.3390/E24111610},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entropy/GuangYDWZZD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecai2/GhayoulaFSGPZ22,
  author       = {Ridha Ghayoula and
                  Jaouhar Fattahi and
                  Amor Smida and
                  Issam El Gmati and
                  Emil Pricop and
                  Marwa Ziadia},
  title        = {{FPGA} Implementation of {SIMON-128} Cryptographic Algorithm Using
                  Artix-7},
  booktitle    = {14th International Conference on Electronics, Computers and Artificial
                  Intelligence, {ECAI} 2022, Ploiesti, Romania, June 30 - July 1, 2022},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ECAI54874.2022.9847520},
  doi          = {10.1109/ECAI54874.2022.9847520},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecai2/GhayoulaFSGPZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpt/KamuchekaN0H22,
  author       = {Tendayi Kamucheka and
                  Alexander Nelson and
                  David Andrews and
                  Miaoqing Huang},
  title        = {A Masked Pure-Hardware Implementation of Kyber Cryptographic Algorithm},
  booktitle    = {International Conference on Field-Programmable Technology, {(IC)FPT}
                  2022, Hong Kong, December 5-9, 2022},
  pages        = {1},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICFPT56656.2022.9974404},
  doi          = {10.1109/ICFPT56656.2022.9974404},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fpt/KamuchekaN0H22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ftc/Hassan22,
  author       = {Alaa Hassan},
  editor       = {Kohei Arai},
  title        = {Implementation of Lightweight Cryptographic Algorithms in IoT Devices
                  and Sensor Networks},
  booktitle    = {Proceedings of the Future Technologies Conference, {FTC} 2022, Virtual
                  Event, 20-21 October 2022, Volume 2},
  series       = {Lecture Notes in Networks and Systems},
  volume       = {560},
  pages        = {130--146},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-18458-1\_10},
  doi          = {10.1007/978-3-031-18458-1\_10},
  timestamp    = {Thu, 16 Mar 2023 11:22:38 +0100},
  biburl       = {https://dblp.org/rec/conf/ftc/Hassan22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KamuchekaNAH22,
  author       = {Tendayi Kamucheka and
                  Alexander Nelson and
                  David Andrews and
                  Miaoqing Huang},
  title        = {A Masked Pure-Hardware Implementation of Kyber Cryptographic Algorithm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1547},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1547},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/KamuchekaNAH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/hal/Besson21,
  author       = {Lo{\"{\i}}c Besson},
  title        = {Design, analysis and implementation of cryptographic symmetric encryption
                  algorithms on {FPGA.} (Conception, analyse et impl{\'{e}}mentation
                  d'algorithmes de chiffrement sym{\'{e}}trique sur {FPGA)}},
  school       = {University of Paris-Saclay, France},
  year         = {2021},
  url          = {https://tel.archives-ouvertes.fr/tel-03526551},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/hal/Besson21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/hal/MathieuMahias21,
  author       = {Axel Mathieu{-}Mahias},
  title        = {Securisation of implementations of cryptographic algorithms in the
                  context of embedded systems. (S{\'{e}}curisation des impl{\'{e}}mentations
                  d'algorithmes cryptographiques pour les syst{\`{e}}mes embarqu{\'{e}}s)},
  school       = {University of Paris-Saclay, France},
  year         = {2021},
  url          = {https://tel.archives-ouvertes.fr/tel-03537322},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/hal/MathieuMahias21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhouHZC21,
  author       = {Yukun Zhou and
                  Baidong Hu and
                  Yitao Zhang and
                  Weiming Cai},
  title        = {Implementation of Cryptographic Algorithm in Dynamic {QR} Code Payment
                  System and Its Performance},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {122362--122372},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3108189},
  doi          = {10.1109/ACCESS.2021.3108189},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ZhouHZC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmemcom/GanbaatarNCI21,
  author       = {Ganbat Ganbaatar and
                  Dugar Nyamdorj and
                  Gordon Cichon and
                  Tseren{-}Onolt Ishdorj},
  title        = {Implementation of {RSA} cryptographic algorithm using {SN} {P} systems
                  based on {HP/LP} neurons},
  journal      = {J. Membr. Comput.},
  volume       = {3},
  number       = {1},
  pages        = {22--34},
  year         = {2021},
  url          = {https://doi.org/10.1007/s41965-021-00073-3},
  doi          = {10.1007/S41965-021-00073-3},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmemcom/GanbaatarNCI21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2110-13407,
  author       = {Favin Fernandes and
                  Gauravi Dungarwal and
                  Aishwariya Gaikwad and
                  Ishan Kareliya and
                  Swati Shilaskar},
  title        = {{VLSI} Implementation of Cryptographic Algorithms {\&} Techniques:
                  {A} Literature Review},
  journal      = {CoRR},
  volume       = {abs/2110.13407},
  year         = {2021},
  url          = {https://arxiv.org/abs/2110.13407},
  eprinttype    = {arXiv},
  eprint       = {2110.13407},
  timestamp    = {Thu, 28 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2110-13407.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/hal/Sleem20,
  author       = {Lama Sleem},
  title        = {Design and implementation of lightweight and secure cryptographic
                  algorithms for embedded devices. (Conception et impl{\'{e}}mentation
                  d'algorithmes cryptographiques l{\'{e}}gers et s{\'{e}}curis{\'{e}}s
                  pour dispositifs embarqu{\'{e}}s)},
  school       = {University of Burgundy Franche-Comt{\'{e}}, France},
  year         = {2020},
  url          = {https://tel.archives-ouvertes.fr/tel-03101356},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/phd/hal/Sleem20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/tr/Aslan20,
  author       = {F{\"{u}}sun Yavuzer Aslan},
  title        = {Nesnelerin interneti uygulamalar{\i}n{\i}n g{\"{u}}venli{\u{g}}i
                  i{\c{c}}in hafif s{\i}klet kriptografik algoritmalar{\i}n analizi
                  ve g{\"{u}}venli ak{\i}ll{\i} bir platform uygulamas{\i} (Analysis
                  of lightweight cryptographic algorithms for iot security and implementation
                  of a secure smart platform)},
  school       = {Trakya University, Turkey},
  year         = {2020},
  url          = {https://tez.yok.gov.tr/UlusalTezMerkezi/tezDetay.jsp?id=\_Ervxj53G0z2QXM7x4kepA\&no=ru4gpuM4TdHLXeqRKHO9Lw},
  timestamp    = {Sun, 29 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/tr/Aslan20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ewdts/SafaryanRCPLA20,
  author       = {Olga A. Safaryan and
                  Evgenia V. Roshchina and
                  Larissa V. Cherckesova and
                  Elena V. Pinevich and
                  Andrey G. Lobodenko and
                  Boris A. Akishin},
  title        = {Cryptographic Algorithm Implementation for Data Encryption in {DBMS}
                  {MS} {SQL} Server},
  booktitle    = {{IEEE} East-West Design {\&} Test Symposium, {EWDTS} 2020, Varna,
                  Bulgaria, September 4-7, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/EWDTS50664.2020.9224775},
  doi          = {10.1109/EWDTS50664.2020.9224775},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ewdts/SafaryanRCPLA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tencon/TorrenoLRB20,
  author       = {Alexis Czezar Cruz Torreno and
                  Maria Theresa Gusad de Leon and
                  Marc Driz Rosales and
                  Anastacia Ballesil{-}Alvarez},
  title        = {Power and Area Oriented Implementations of Lightweight Cryptographic
                  Algorithms for Wireless Sensor Networks},
  booktitle    = {2020 {IEEE} Region 10 Conference, {TENCON} 2020, Osaka, Japan, November
                  16-19, 2020},
  pages        = {473--477},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/TENCON50793.2020.9293929},
  doi          = {10.1109/TENCON50793.2020.9293929},
  timestamp    = {Thu, 28 Jan 2021 11:14:07 +0100},
  biburl       = {https://dblp.org/rec/conf/tencon/TorrenoLRB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/meco/RihaKN19,
  author       = {Jan R{\'{\i}}ha and
                  Jakub Klemsa and
                  Martin Novotn{\'{y}}},
  title        = {Multiprecision {ANSI} {C} Library for Implementation of Cryptographic
                  Algorithms on Microcontrollers},
  booktitle    = {8th Mediterranean Conference on Embedded Computing, {MECO} 2019, Budva,
                  Montenegro, June 10-14, 2019},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/MECO.2019.8760285},
  doi          = {10.1109/MECO.2019.8760285},
  timestamp    = {Mon, 09 Aug 2021 14:54:01 +0200},
  biburl       = {https://dblp.org/rec/conf/meco/RihaKN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/it/Mella18,
  author       = {Silvia Mella},
  title        = {Analysis of cryptographic algorithms against theoretical and implementation
                  attacks},
  school       = {University of Milan, Italy},
  year         = {2018},
  url          = {https://opac.bncf.firenze.sbn.it/bncf-prod/resource?uri=TD18003044},
  timestamp    = {Sat, 06 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/it/Mella18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcbb/BogdanovKLS18,
  author       = {Dan Bogdanov and
                  Liina Kamm and
                  Sven Laur and
                  Ville Sokk},
  title        = {Implementation and Evaluation of an Algorithm for Cryptographically
                  Private Principal Component Analysis on Genomic Data},
  journal      = {{IEEE} {ACM} Trans. Comput. Biol. Bioinform.},
  volume       = {15},
  number       = {5},
  pages        = {1427--1432},
  year         = {2018},
  url          = {https://doi.org/10.1109/TCBB.2018.2858818},
  doi          = {10.1109/TCBB.2018.2858818},
  timestamp    = {Mon, 03 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcbb/BogdanovKLS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vdat/RaveendranDP18,
  author       = {Abhimanniu Raveendran and
                  Sanjay B. Dhok and
                  Rajendra M. Patrikar},
  editor       = {S. Rajaram and
                  N. B. Balamurugan and
                  D. Gracia Nirmala Rani and
                  Virendra Singh},
  title        = {High Level Synthesis and Implementation of Cryptographic Algorithm
                  in {AHIR} Platform},
  booktitle    = {{VLSI} Design and Test - 22nd International Symposium, {VDAT} 2018,
                  Madurai, India, June 28-30, 2018, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {892},
  pages        = {16--27},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-981-13-5950-7\_2},
  doi          = {10.1007/978-981-13-5950-7\_2},
  timestamp    = {Wed, 04 May 2022 16:21:48 +0200},
  biburl       = {https://dblp.org/rec/conf/vdat/RaveendranDP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HouBZL18,
  author       = {Xiaolu Hou and
                  Jakub Breier and
                  Fuyuan Zhang and
                  Yang Liu},
  title        = {Fully Automated Differential Fault Analysis on Software Implementations
                  of Cryptographic Algorithms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {545},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/545},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HouBZL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asicon/LiuYL17,
  author       = {Min Liu and
                  Ying Jian Yan and
                  Wei Li},
  editor       = {Yajie Qin and
                  Zhiliang Hong and
                  Ting{-}Ao Tang},
  title        = {Implementation and optimization of {A5-1} algorithm on coarse-grained
                  reconfigurable cryptographic logic array},
  booktitle    = {12th {IEEE} International Conference on ASIC, {ASICON} 2017, Guiyang,
                  China, October 25-28, 2017},
  pages        = {279--282},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ASICON.2017.8252467},
  doi          = {10.1109/ASICON.2017.8252467},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/asicon/LiuYL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsc/CiSYDLM17,
  author       = {Yunfei Ci and
                  Guozhen Shi and
                  Feng Yang and
                  Jiawen Diao and
                  Cuijie Liu and
                  Weihua Mao},
  title        = {Design and Implementation of the Components of the Symmetric Cryptographic
                  Algorithm},
  booktitle    = {Second {IEEE} International Conference on Data Science in Cyberspace,
                  {DSC} 2017, Shenzhen, China, June 26-29, 2017},
  pages        = {483--487},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/DSC.2017.23},
  doi          = {10.1109/DSC.2017.23},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsc/CiSYDLM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsc/ShiZY17,
  author       = {Yu Shi and
                  Dong Zheng and
                  Chung{-}Huang Yang},
  title        = {The Efficient Implementation of the Android Kernel with China Standard
                  Cryptographic Algorithm},
  booktitle    = {Second {IEEE} International Conference on Data Science in Cyberspace,
                  {DSC} 2017, Shenzhen, China, June 26-29, 2017},
  pages        = {421--425},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/DSC.2017.86},
  doi          = {10.1109/DSC.2017.86},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsc/ShiZY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpec/ZhouEJ17,
  author       = {Boyou Zhou and
                  Manuel Egele and
                  Ajay Joshi},
  title        = {High-performance low-energy implementation of cryptographic algorithms
                  on a programmable SoC for IoT devices},
  booktitle    = {2017 {IEEE} High Performance Extreme Computing Conference, {HPEC}
                  2017, Waltham, MA, USA, September 12-14, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/HPEC.2017.8091062},
  doi          = {10.1109/HPEC.2017.8091062},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hpec/ZhouEJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc8221,
  author       = {Paul Wouters and
                  Daniel Migault and
                  John Preu{\ss} Mattsson and
                  Yoav Nir and
                  Tero Kivinen},
  title        = {Cryptographic Algorithm Implementation Requirements and Usage Guidance
                  for Encapsulating Security Payload {(ESP)} and Authentication Header
                  {(AH)}},
  journal      = {{RFC}},
  volume       = {8221},
  pages        = {1--15},
  year         = {2017},
  url          = {https://doi.org/10.17487/RFC8221},
  doi          = {10.17487/RFC8221},
  timestamp    = {Fri, 22 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc8221.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/hal/Robert15,
  author       = {Jean{-}Marc Robert},
  title        = {Contrer l'attaque Simple Power Analysis efficacement dans les applications
                  de la cryptographie asym{\'{e}}trique, algorithmes et implantations.
                  (Thwart simple power analysis efficiently in asymmetric cryptographic
                  applications, algorithms and implementations)},
  school       = {University of Perpignan, France},
  year         = {2015},
  url          = {https://tel.archives-ouvertes.fr/tel-01269753},
  timestamp    = {Tue, 21 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/hal/Robert15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/hal/Zeitoun15,
  author       = {Rina Zeitoun},
  title        = {Algebraic methods for security analysis of cryptographic algorithms
                  implementations. (M{\'{e}}thodes alg{\'{e}}briques pour
                  l'analyse de s{\'{e}}curit{\'{e}} des implantations d'algorithmes
                  cryptographiques)},
  school       = {Pierre and Marie Curie University, Paris, France},
  year         = {2015},
  url          = {https://tel.archives-ouvertes.fr/tel-01254443},
  timestamp    = {Tue, 21 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/hal/Zeitoun15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/RaoRV15,
  author       = {Pallipamu Venkateswara Rao and
                  K. Thammi Reddy and
                  P. Suresh Varma},
  title        = {{ASH-512:} Design and implementation of cryptographic hash algorithm
                  using co-ordinate geometry concepts},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {20},
  pages        = {47--60},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jisa.2014.10.006},
  doi          = {10.1016/J.JISA.2014.10.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/RaoRV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/depcos/Sugier15,
  author       = {Jaroslaw Sugier},
  editor       = {Wojciech Zamojski and
                  Jacek Mazurkiewicz and
                  Jaroslaw Sugier and
                  Tomasz Walkowiak and
                  Janusz Kacprzyk},
  title        = {Popular {FPGA} Device Families in Implementation of Cryptographic
                  Algorithms},
  booktitle    = {Theory and Engineering of Complex Systems and Dependability - Proceedings
                  of the Tenth International Conference on Dependability and Complex
                  Systems DepCoS-RELCOMEX, June 29 - July 3 2015, Brun{\'{o}}w,
                  Poland},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {365},
  pages        = {485--494},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19216-1\_46},
  doi          = {10.1007/978-3-319-19216-1\_46},
  timestamp    = {Sat, 19 Oct 2019 20:27:57 +0200},
  biburl       = {https://dblp.org/rec/conf/depcos/Sugier15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpcc/GuoQZ15,
  author       = {Guang{-}liang Guo and
                  Quan Qian and
                  Rui Zhang},
  title        = {Different Implementations of {AES} Cryptographic Algorithm},
  booktitle    = {17th {IEEE} International Conference on High Performance Computing
                  and Communications, {HPCC} 2015, 7th {IEEE} International Symposium
                  on Cyberspace Safety and Security, {CSS} 2015, and 12th {IEEE} International
                  Conference on Embedded Software and Systems, {ICESS} 2015, New York,
                  NY, USA, August 24-26, 2015},
  pages        = {1848--1853},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/HPCC-CSS-ICESS.2015.215},
  doi          = {10.1109/HPCC-CSS-ICESS.2015.215},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/hpcc/GuoQZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vlsisp/SchneiderMGO14,
  author       = {Tobias Schneider and
                  Ingo von Maurich and
                  Tim G{\"{u}}neysu and
                  David F. Oswald},
  title        = {Cryptographic Algorithms on the {GA144} Asynchronous Multi-Core Processor
                  - Implementation and Side-Channel Analysis},
  journal      = {J. Signal Process. Syst.},
  volume       = {77},
  number       = {1-2},
  pages        = {151--167},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11265-014-0872-5},
  doi          = {10.1007/S11265-014-0872-5},
  timestamp    = {Thu, 07 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/vlsisp/SchneiderMGO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isccsp/AthanasiouMT14,
  author       = {George Athanasiou and
                  George{-}Paris Makkas and
                  Georgios Theodoridis},
  title        = {High throughput pipelined {FPGA} implementation of the new {SHA-3}
                  cryptographic hash algorithm},
  booktitle    = {6th International Symposium on Communications, Control and Signal
                  Processing, {ISCCSP} 2014, Athens, Greece, May 21-23, 2014},
  pages        = {538--541},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISCCSP.2014.6877931},
  doi          = {10.1109/ISCCSP.2014.6877931},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/isccsp/AthanasiouMT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc7321,
  author       = {David A. McGrew and
                  Paul E. Hoffman},
  title        = {Cryptographic Algorithm Implementation Requirements and Usage Guidance
                  for Encapsulating Security Payload {(ESP)} and Authentication Header
                  {(AH)}},
  journal      = {{RFC}},
  volume       = {7321},
  pages        = {1--11},
  year         = {2014},
  url          = {https://doi.org/10.17487/RFC7321},
  doi          = {10.17487/RFC7321},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc7321.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/YuliantoP13,
  author       = {Aditya Yulianto and
                  Maria Irmina Prasetiyowati},
  title        = {BoxLock: Mobile-based Serpent cryptographic algorithm and One-Time
                  Password mechanism implementation for Dropbox files security},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {357--362},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750222},
  doi          = {10.1109/ICITST.2013.6750222},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/YuliantoP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/Savas13,
  author       = {Erkay Savas},
  editor       = {Atilla El{\c{c}}i and
                  Manoj Singh Gaur and
                  Mehmet A. Orgun and
                  Oleg B. Makarevich},
  title        = {Attacks on implementations of cryptographic algorithms: side-channel
                  and fault attacks},
  booktitle    = {The 6th International Conference on Security of Information and Networks,
                  {SIN} '13, Aksaray, Turkey, November 26-28, 2013},
  pages        = {7--14},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523514.2523593},
  doi          = {10.1145/2523514.2523593},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/Savas13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/KaraklajicFV12,
  author       = {Dusko Karaklajic and
                  Junfeng Fan and
                  Ingrid Verbauwhede},
  title        = {A systematic {M} safe-error detection in hardware implementations
                  of cryptographic algorithms},
  booktitle    = {2012 {IEEE} International Symposium on Hardware-Oriented Security
                  and Trust, {HOST} 2012, San Francisco, CA, USA, June 3-4, 2012},
  pages        = {96--101},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/HST.2012.6224327},
  doi          = {10.1109/HST.2012.6224327},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/KaraklajicFV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/basesearch/Kizhvatov11,
  author       = {Ilya Kizhvatov},
  title        = {Physical Security of Cryptographic Algorithm Implementations},
  school       = {University of Luxembourg},
  year         = {2011},
  url          = {http://orbilu.uni.lu/handle/10993/15446},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/basesearch/Kizhvatov11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AbdelhalimEAE11,
  author       = {Mohamed B. Abdelhalim and
                  Mohamed S. El{-}Mahallawy and
                  M. Ayyad and
                  Adel ElHennawy},
  title        = {Implementation of a modified lightweight cryptographic {TEA} algorithm
                  in {RFID} system},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {509--513},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148491/},
  timestamp    = {Sun, 27 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AbdelhalimEAE11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc6094,
  author       = {Manav Bhatia and
                  Vishwas Manral},
  title        = {Summary of Cryptographic Authentication Algorithm Implementation Requirements
                  for Routing Protocols},
  journal      = {{RFC}},
  volume       = {6094},
  pages        = {1--11},
  year         = {2011},
  url          = {https://doi.org/10.17487/RFC6094},
  doi          = {10.17487/RFC6094},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc6094.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/riga/NazarukR10,
  author       = {Vladislav Nazaruk and
                  Pavel Rusakov},
  title        = {Implementation of Cryptographic Algorithms in Software: An Analysis
                  of the Effectiveness},
  journal      = {Sci. J. Riga Tech. Univ. Ser. Comput. Sci.},
  volume       = {41},
  pages        = {97--105},
  year         = {2010},
  url          = {https://doi.org/10.2478/v10143-010-0030-x},
  doi          = {10.2478/V10143-010-0030-X},
  timestamp    = {Wed, 24 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/riga/NazarukR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/FanGLH10,
  author       = {Xinxin Fan and
                  Guang Gong and
                  Ken Lauffenburger and
                  Troy Hicks},
  editor       = {Jim Plusquellic and
                  Ken Mai},
  title        = {{FPGA} Implementations of the Hummingbird Cryptographic Algorithm},
  booktitle    = {{HOST} 2010, Proceedings of the 2010 {IEEE} International Symposium
                  on Hardware-Oriented Security and Trust (HOST), 13-14 June 2010, Anaheim
                  Convention Center, California, {USA}},
  pages        = {48--51},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/HST.2010.5513116},
  doi          = {10.1109/HST.2010.5513116},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/FanGLH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccd/MansouriD10,
  author       = {Shohreh Sharif Mansouri and
                  Elena Dubrova},
  title        = {Pulse latch based FSRs for low-overhead hardware implementation of
                  cryptographic algorithms},
  booktitle    = {28th International Conference on Computer Design, {ICCD} 2010, 3-6
                  October 2010, Amsterdam, The Netherlands, Proceedings},
  pages        = {253--259},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICCD.2010.5647756},
  doi          = {10.1109/ICCD.2010.5647756},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccd/MansouriD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/ZhangLWW10,
  author       = {Luguo Zhang and
                  Zheng Li and
                  Ruijiao Wang and
                  Shengjun Wen},
  title        = {Design and implementation of multiple cryptographic algorithm interface
                  circuit based on secure SoC},
  booktitle    = {Proceedings of the {IEEE} International Conference on Wireless Communications,
                  Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
                  Beijing, China},
  pages        = {510--514},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WCINS.2010.5541831},
  doi          = {10.1109/WCINS.2010.5541831},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/wcnis/ZhangLWW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SanA10,
  author       = {Ismail San and
                  Nuray At},
  title        = {Enhanced {FPGA} Implementation of the Hummingbird Cryptographic Algorithm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {586},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/586},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SanA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpl/VelegalatiK09,
  author       = {Rajesh Velegalati and
                  Jens{-}Peter Kaps},
  editor       = {Martin Danek and
                  Jiri Kadlec and
                  Brent E. Nelson},
  title        = {{DPA} resistance for light-weight implementations of cryptographic
                  algorithms on FPGAs},
  booktitle    = {19th International Conference on Field Programmable Logic and Applications,
                  {FPL} 2009, August 31 - September 2, 2009, Prague, Czech Republic},
  pages        = {385--390},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/FPL.2009.5272260},
  doi          = {10.1109/FPL.2009.5272260},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/fpl/VelegalatiK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/FanHGSE09,
  author       = {Xinxin Fan and
                  Honggang Hu and
                  Guang Gong and
                  Eric M. Smith and
                  Daniel W. Engels},
  title        = {Lightweight implementation of Hummingbird cryptographic algorithm
                  on 4-bit microcontrollers},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402515},
  doi          = {10.1109/ICITST.2009.5402515},
  timestamp    = {Mon, 09 Aug 2021 17:01:45 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/FanHGSE09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/ZhangDD08,
  author       = {Dawei Zhang and
                  Wenrui Ding and
                  Ding Ding},
  editor       = {Jeng{-}Shyang Pan and
                  Xiamu Niu and
                  Hsiang{-}Cheh Huang and
                  Lakhmi C. Jain},
  title        = {Fast Implementation of {SMS4} Cryptographic Algorithms on Smart Card},
  booktitle    = {4th International Conference on Intelligent Information Hiding and
                  Multimedia Signal Processing {(IIH-MSP} 2008), Harbin, China, 15-17
                  August 2008, Proceedings},
  pages        = {287--290},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IIH-MSP.2008.179},
  doi          = {10.1109/IIH-MSP.2008.179},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iih-msp/ZhangDD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/basesearch/MeuricedeDormale07,
  author       = {Guerric Meurice de Dormale},
  title        = {Destructive and constructive aspects of efficient algorithms and implementation
                  of cryptographic hardware},
  school       = {Catholic University of Louvain, Louvain-la-Neuve, Belgium},
  year         = {2007},
  url          = {https://hdl.handle.net/2078.1/5049},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/basesearch/MeuricedeDormale07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc4835,
  author       = {Vishwas Manral},
  title        = {Cryptographic Algorithm Implementation Requirements for Encapsulating
                  Security Payload {(ESP)} and Authentication Header {(AH)}},
  journal      = {{RFC}},
  volume       = {4835},
  pages        = {1--10},
  year         = {2007},
  url          = {https://doi.org/10.17487/RFC4835},
  doi          = {10.17487/RFC4835},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc4835.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secperu/MarkovicD06,
  author       = {Milan Markovic and
                  Goran Dordevic},
  title        = {On Implementation Aspects of Standard Asymmetric and Symmetric Cryptographic
                  Algorithms on {TI} Signal Processors},
  booktitle    = {Second International Workshop on Security, Privacy and Trust in Pervasive
                  and Ubiquitous Computing (SecPerU 2006), 29 June 2006, Lyon, France},
  pages        = {57--62},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/SECPERU.2006.12},
  doi          = {10.1109/SECPERU.2006.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secperu/MarkovicD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc4305,
  author       = {Donald E. Eastlake III},
  title        = {Cryptographic Algorithm Implementation Requirements for Encapsulating
                  Security Payload {(ESP)} and Authentication Header {(AH)}},
  journal      = {{RFC}},
  volume       = {4305},
  pages        = {1--9},
  year         = {2005},
  url          = {https://doi.org/10.17487/RFC4305},
  doi          = {10.17487/RFC4305},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc4305.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cau/BrownDN04,
  author       = {Jaimee Brown and
                  Ed Dawson and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  editor       = {Ed Dawson and
                  Wolfgang Klemm},
  title        = {Implementation of the {GBD} Cryptosystem},
  booktitle    = {Cryptographic Algorithms and their Uses - 2004, International Workshop,
                  Gold Coast, Australia, July 5-6, 2004, Proceedings},
  pages        = {94--109},
  publisher    = {Queensland University of Technology},
  year         = {2004},
  timestamp    = {Fri, 16 Jul 2004 13:22:45 +0200},
  biburl       = {https://dblp.org/rec/conf/cau/BrownDN04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cau/HenricksenYF04,
  author       = {Matthew Henricksen and
                  Ming Yao and
                  Ernest Foo},
  editor       = {Ed Dawson and
                  Wolfgang Klemm},
  title        = {An Implementation of the Yao Forward Integrity Protocol for Mobile
                  Agents},
  booktitle    = {Cryptographic Algorithms and their Uses - 2004, International Workshop,
                  Gold Coast, Australia, July 5-6, 2004, Proceedings},
  pages        = {110--124},
  publisher    = {Queensland University of Technology},
  year         = {2004},
  timestamp    = {Fri, 16 Jul 2004 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cau/HenricksenYF04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpl/GonzalezLGM03,
  author       = {Iv{\'{a}}n Gonz{\'{a}}lez and
                  Sergio L{\'{o}}pez{-}Buedo and
                  Francisco J. G{\'{o}}mez and
                  Javier Mart{\'{\i}}nez},
  editor       = {Peter Y. K. Cheung and
                  George A. Constantinides and
                  Jos{\'{e}} T. de Sousa},
  title        = {Using Partial Reconfiguration in Cryptographic Applications: An Implementation
                  of the {IDEA} Algorithm},
  booktitle    = {Field Programmable Logic and Application, 13th International Conference,
                  {FPL} 2003, Lisbon, Portugal, September 1-3, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2778},
  pages        = {194--203},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45234-8\_20},
  doi          = {10.1007/978-3-540-45234-8\_20},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/fpl/GonzalezLGM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpl/HamalainenTS02,
  author       = {Antti H{\"{a}}m{\"{a}}l{\"{a}}inen and
                  Matti Tommiska and
                  Jorma Skytt{\"{a}}},
  editor       = {Manfred Glesner and
                  Peter Zipf and
                  Michel Renovell},
  title        = {8 Gigabits per Second Implementation of the {IDEA} Cryptographic Algorithm},
  booktitle    = {Field-Programmable Logic and Applications, Reconfigurable Computing
                  Is Going Mainstream, 12th International Conference, {FPL} 2002, Montpellier,
                  France, September 2-4, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2438},
  pages        = {760--769},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-46117-5\_78},
  doi          = {10.1007/3-540-46117-5\_78},
  timestamp    = {Sat, 30 Sep 2023 09:41:27 +0200},
  biburl       = {https://dblp.org/rec/conf/fpl/HamalainenTS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isspa/ShamsuddinBG01,
  author       = {Shuhaimi bin Shamsuddin and
                  Mohd Dani bin Baba and
                  Deepak K. Ghodgaonkar},
  title        = {Implementation of cryptographic algorithms for radio telemetry using
                  LabVIEW},
  booktitle    = {Proceedings of the Sixth International Symposium on Signal Processing
                  and its Applications, {ISSPA} 2001, August 13-16 2001, Shmgri-La Hotel,
                  Kuala Lumpur, Malaysia},
  pages        = {749--750},
  publisher    = {{IEEE}},
  year         = {2001},
  url          = {https://doi.org/10.1109/ISSPA.2001.950260},
  doi          = {10.1109/ISSPA.2001.950260},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isspa/ShamsuddinBG01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sbcci/SalomaoF98,
  author       = {S. Salom{\~{a}}o and
                  V. Alves and
                  E. Filho},
  title        = {A Two-level Pipelined Implementation of the {IDEA} Cryptographic Algorithm},
  booktitle    = {Proceedings of the 11th Annual Symposium on Integrated Circuits Design,
                  {SBCCI} 1998, Rio de Janiero, Brazil, September 30 - October 2, 1998},
  pages        = {158--161},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.ieeecomputersociety.org/10.1109/SBCCI.1998.715431},
  doi          = {10.1109/SBCCI.1998.715431},
  timestamp    = {Thu, 26 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sbcci/SalomaoF98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics