91
Voted
DFN
15 years 3 months ago
2010 182
Voted
CATA
15 years 2 months ago
2010
In this paper, a hardware implementation of the AES128 encryption algorithm is proposed. A unique feature of the proposed pipelined design is that the round keys, which are consum...
182
Voted
TCOS
14 years 9 months ago
2010
Password Authenticated Key Exchange (PAKE) is one of the important topics in cryptography. It aims to address a practical security problem: how to establish secure communication be...
157
Voted
TCOS
14 years 9 months ago
2010
With the increasing wealth of digital information stored on computer systems today, security issues have become increasingly important. In addition to attacks targeting the softwar...
172
Voted
CAINE
15 years 6 days ago
2010 |