Author:
Tillich Stefan,Großschädl Johann
Publisher
Springer Berlin Heidelberg
Reference20 articles.
1. Lecture Notes in Computer Science;G. Bertoni,2003
2. Bertoni, G., Breveglieri, L., Farina, R., Regazzoni, F.: Speeding Up AES By Extending a 32-Bit Processor Instruction Set. In: Proceedings of the 17th IEEE International Conference on Application-Specific Systems, Architectures and Processors (ASAP 2006), September 2006. IEEE CS Press, Los Alamitos (to be published, 2006)
3. Burke, J., McDonald, J., Austin, T.: Architectural support for fast symmetric-key cryptography. In: Proceedings of the 9th Int. Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2000), pp. 178–189. ACM Press, New York (2000)
4. Lecture Notes in Computer Science;D. Canright,2005
5. Fiskiran, A.M., Lee, R.B.: On-Chip Lookup Tables for Fast Symmetric-Key Encryption. In: Proceedings of the 16th IEEE International Conference on Application-Specific Systems, Architectures and Processors (ASAP 2005), pp. 356–363. IEEE CS Press, Los Alamitos (2005)
Cited by
32 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Area-Delay Efficient Security Scheme for Smart Hospital Systems;2023 IEEE International Conference on Cyber Security and Resilience (CSR);2023-07-31
2. Resource-Constrained Encryption: Extending Ibex with a QARMA Hardware Accelerator;2023 IEEE 34th International Conference on Application-specific Systems, Architectures and Processors (ASAP);2023-07
3. A Trigonometric Function Instruction Set Extension Method Based on RISC-V;2022 IEEE/ACIS 22nd International Conference on Computer and Information Science (ICIS);2022-06-26
4. DyWCP;Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks;2022-05-16
5. Side-Channel Attacks in the Internet of Things;Research Anthology on Artificial Intelligence Applications in Security;2021