Results 261 to 270 of about 429,323 (284)
Some of the next articles are maybe not open access.
SW-AES: Accelerating AES Algorithm on the Sunway TaihuLight
2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017The Advanced Encryption Standard (AES) is a widely-used efficient cryptographic algorithm. Although AES is fast both in software and hardware, it is time-consuming to do data encryption especially for large amount of data. Therefore, it is a lasting effort to accelerate AES algorithms.
Guangwen Yang+6 more
openaire +2 more sources
Packed AES-GCM Algorithm Suitable for AES/PCLMULQDQ Instructions
IEEE Transactions on Computers, 2011zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Pierre Laurent, Krzysztof Jankowski
openaire +2 more sources
Astrophysics and Space Science, 1994
Herbig Ae/Be stars are the higher mass counterparts of the T Tauri stars. In comparison with the latter, however, relatively little is known about them. After a historical introduction, we briefly review their optical and UV spectroscopic properties.
openaire +2 more sources
Herbig Ae/Be stars are the higher mass counterparts of the T Tauri stars. In comparison with the latter, however, relatively little is known about them. After a historical introduction, we briefly review their optical and UV spectroscopic properties.
openaire +2 more sources
Quantitative AES VII. The ionization cross-section in AES
Surface and Interface Analysis, 1998Inner shell ionization cross-sections are analyzed for use with Auger electron spectroscopy (AES). Correlations of the cross-sections of Gryzinski, Casnati et al., Jakoby et al. and Drawin are made with experimental data from the digital Auger database. Jakoby et al.'s cross-section is realistic for K shell ionizations but can become negative for other
Ian S. Gilmore, Martin P. Seah
openaire +2 more sources
Simulations of Optical Emissions for Attacking AES and Masked AES
2015In this paper we present a novel attack based on photonic emission analysis targeting software implementations of AES. We focus on the particular case in which the attacker can collect the photonic emission of a limited number of sense amplifiers e.g. only one of the SRAM storing the S-Box.
Filippo Melzani+2 more
openaire +1 more source
2005
In this paper we describe two different DFA attacks on the AES. The first one uses a fault model that induces a fault on only one bit of an intermediate result, hence allowing us to obtain the key by using 50 faulty ciphertexts for an AES-128. The second attack uses a more realistic fault model: we assume that we may induce a fault on a whole byte. For
openaire +1 more source
In this paper we describe two different DFA attacks on the AES. The first one uses a fault model that induces a fault on only one bit of an intermediate result, hence allowing us to obtain the key by using 50 faulty ciphertexts for an AES-128. The second attack uses a more realistic fault model: we assume that we may induce a fault on a whole byte. For
openaire +1 more source
Compare Contamination Discharge AE with Corona Discharge AE
2009 Asia-Pacific Power and Energy Engineering Conference, 2009In order to know discharge type exactly, contamination discharge AE and corona AE of insulator are compared by experiments. Increase test voltage and vary work condition, at the same time, measure and record AE wave from contamination discharge and corona discharge, then the varying laws of AE with test voltage and with test time during the two ...
Yun Guan, Chengjiang Wang
openaire +2 more sources
2009
In the present work we study a security of the AES cipher. We concern in a mathematical representation of a block cipher and how to use it to algebraic attacks. We show a summary of known algorithms which are useful for these attacks. We show how to convert problem of solving the system of polynomial equations to SAT problem and we describe how SAT ...
openaire +2 more sources
In the present work we study a security of the AES cipher. We concern in a mathematical representation of a block cipher and how to use it to algebraic attacks. We show a summary of known algorithms which are useful for these attacks. We show how to convert problem of solving the system of polynomial equations to SAT problem and we describe how SAT ...
openaire +2 more sources