Sciweavers

8 search results - page 2 / 2
» A Comparison of the AES Candidates Amenability to FPGA Imple...
Sort
View
71
Voted
FDTC
2009
Springer
126views Cryptology» more  FDTC 2009»
15 years 4 months ago
WDDL is Protected against Setup Time Violation Attacks
—In order to protect crypto-systems against side channel attacks various countermeasures have been implemented such as dual-rail logic or masking. Faults attacks are a powerful t...
Nidhal Selmane, Shivam Bhasin, Sylvain Guilley, Ta...
VTC
2008
IEEE
129views Communications» more  VTC 2008»
15 years 3 months ago
On Parallelizing the CryptMT Stream Cipher
Abstract—Fast stream ciphers are used extensively for encrypted data transmission in mobile networks and over multigigabit links. CryptMT, a recently proposed stream cipher, is o...
Deian Stefan, David B. Nummey, Jared Harwayne-Gida...
FCCM
2000
IEEE
148views VLSI» more  FCCM 2000»
15 years 1 months ago
An Adaptive Cryptographic Engine for IPSec Architectures
Architectures that implement the Internet Protocol Security (IPSec) standard have to meet the enormous computing demands of cryptographic algorithms. In addition, IPSec architectu...
Andreas Dandalis, Viktor K. Prasanna, José ...