Sciweavers

981 search results - page 20 / 197
» Advanced Encryption Standard
Sort
View
CHES
2006
Springer
205views Cryptology» more  CHES 2006»
14 years 2 months ago
Automated Design of Cryptographic Devices Resistant to Multiple Side-Channel Attacks
Balanced dynamic dual-rail gates and asynchronous circuits have been shown, if implemented correctly, to have natural and efficient resistance to side-channel attacks. Despite thei...
Konrad J. Kulikowski, Alexander B. Smirnov, Alexan...
GLOBECOM
2009
IEEE
13 years 8 months ago
Implementation and Benchmarking of Hardware Accelerators for Ciphering in LTE Terminals
Abstract--In this paper we investigate hardware implementations of ciphering algorithms, SNOW 3G and the Advanced Encryption Standard (AES), for the acceleration of the protocol st...
Sebastian Hessel, David Szczesny, Nils Lohmann, At...
IJNSEC
2007
110views more  IJNSEC 2007»
13 years 10 months ago
A Light Weight Enhancement to RC4 Based Security for Resource Constrained Wireless Devices
The Wired Equivalent Privacy (WEP) uses the 64 bit RC4 secret key stream cipher as its layer 2 security protocol. Although the underlying RC4 cipher is secure, the potential reuse...
Chetan Nanjunda Mathur, K. P. Subbalakshmi
TCC
2005
Springer
169views Cryptology» more  TCC 2005»
14 years 4 months ago
Chosen-Ciphertext Security of Multiple Encryption
Encryption of data using multiple, independent encryption schemes (“multiple encryption”) has been suggested in a variety of contexts, and can be used, for example, to protect ...
Yevgeniy Dodis, Jonathan Katz
EUROCRYPT
2001
Springer
14 years 3 months ago
Does Encryption with Redundancy Provide Authenticity?
ded abstract of this paper appears in Advances in Cryptology – EUROCRYPT ’01, Lecture
Jee Hea An, Mihir Bellare