Sciweavers

CTRSA
2012
Springer
273views Cryptology» more  CTRSA 2012»
12 years 6 days ago
On the Joint Security of Encryption and Signature in EMV
We provide an analysis of current and future algorithms for signature and encryption in the EMV standards in the case where a single key-pair is used for both signature and encrypt...
Jean Paul Degabriele, Anja Lehmann, Kenneth G. Pat...
IJNSEC
2006
80views more  IJNSEC 2006»
13 years 4 months ago
Side Channel Analysis on Biometric-based Key Generation Algorithms on Resource Constrained Devices
Side channel analysis is a technique that enables the adversary to benefit from information leakages occurring due to the implementation of encryption algorithms on
Dimitrios L. Delivasilis, Sokratis K. Katsikas
FPGA
2000
ACM
175views FPGA» more  FPGA 2000»
13 years 8 months ago
An FPGA implementation and performance evaluation of the Serpent block cipher
With the expiration of the Data Encryption Standard (DES) in 1998, the Advanced Encryption Standard (AES) development process is well underway. It is hoped that the result of the ...
Adam J. Elbirt, Christof Paar
FSE
1997
Springer
131views Cryptology» more  FSE 1997»
13 years 8 months ago
Fast Software Encryption: Designing Encryption Algorithms for Optimal Software Speed on the Intel Pentium Processor
Most encryption algorithms are designed without regard to their performance on top-of-the-line microprocessors. This paper discusses general optimization principles algorithms desi...
Bruce Schneier, Doug Whiting
AES
2000
Springer
105views Cryptology» more  AES 2000»
13 years 8 months ago
The Effects of Multiple Algorithms in the Advanced Encryption Standard
This paper presents a discussion of the issues relating to the selection of encryption algorithms in practical situations. An AES standard which recommends multiple algorithms in ...
Ian Harvey