Results 311 to 320 of about 717,304 (368)
Some of the next articles are maybe not open access.
Journal of Science and Technology on Information security, 2020
Abstract—The cryptographic algorithm AES (Advanced Encryption Standard) works with the transformations SubBytes, ShiftRows, MixColumns and AddRoundKey, all of them fixed and selected a priori. In this paper, we will show dynamic variants of AES, where the new transformations are RandomSubBytes, RandomShiftRows, RandomMixColumns and ...
Pablo Freyre +3 more
openaire +1 more source
Abstract—The cryptographic algorithm AES (Advanced Encryption Standard) works with the transformations SubBytes, ShiftRows, MixColumns and AddRoundKey, all of them fixed and selected a priori. In this paper, we will show dynamic variants of AES, where the new transformations are RandomSubBytes, RandomShiftRows, RandomMixColumns and ...
Pablo Freyre +3 more
openaire +1 more source
Low-Latency Hardware Masking with Application to AES
IACR Cryptology ePrint Archive, 2020During the past two decades there has been a great deal of research published on masked hardware implementations of AES and other cryptographic primitives.
Pascal Sasdrich +3 more
semanticscholar +1 more source
Implementing Grover Oracles for Quantum Key Search on AES and LowMC
IACR Cryptology ePrint Archive, 2019Grover’s search algorithm gives a quantum attack against block ciphers by searching for a key that matches a small number of plaintext-ciphertext pairs. This attack uses \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage ...
Samuel Jaques +3 more
semanticscholar +1 more source
IACR Cryptology ePrint Archive
Our work explores the key recovery attack using the Grover's search on the three variants of AES (-128, -192, -256). In total, we develop a pool of 26 implementations per AES variant (totaling 78), by taking the state-of-the-art advancements in the ...
Kyungbae Jang +5 more
semanticscholar +1 more source
Our work explores the key recovery attack using the Grover's search on the three variants of AES (-128, -192, -256). In total, we develop a pool of 26 implementations per AES variant (totaling 78), by taking the state-of-the-art advancements in the ...
Kyungbae Jang +5 more
semanticscholar +1 more source
AES IP for hybrid cryptosystem RSA-AES
2015 IEEE 12th International Multi-Conference on Systems, Signals & Devices (SSD15), 2015AES (Advanced Encryption Standard) is a symmetric-key algorithm, meaning the same key is used for both encrypting and decrypting data. In this paper, we present three hardware architectures for AES, namely Serial/Serial, Parallel /Serial and Parallel/Pipelined.
Anane Nadjia, Anane Mohamed
openaire +1 more source
Packed AES-GCM Algorithm Suitable for AES/PCLMULQDQ Instructions
IEEE Transactions on Computers, 2011zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Jankowski, Krzysztof, Laurent, Pierre
openaire +1 more source
2016
In this chapter, an overview of AE sensor (transducer) is presented. Conversion principal by the AE sensor is discussed. Structures and characteristics of resonant and broad-band AE sensors are explained. A calibration method of AE sensors is briefly introduced.
openaire +1 more source
In this chapter, an overview of AE sensor (transducer) is presented. Conversion principal by the AE sensor is discussed. Structures and characteristics of resonant and broad-band AE sensors are explained. A calibration method of AE sensors is briefly introduced.
openaire +1 more source
Quantum Circuit Implementations of AES with Fewer Qubits
International Conference on the Theory and Application of Cryptology and Information Security, 2020Jian Zou +4 more
semanticscholar +1 more source
Cache Attacks and Countermeasures: The Case of AES
The Cryptographer's Track at RSA Conference, 2006Dag Arne Osvik, A. Shamir, Eran Tromer
semanticscholar +1 more source

