Author:
Kumar Sandeep,Paar Christof,Pelzl Jan,Pfeiffer Gerd,Schimmler Manfred
Publisher
Springer Berlin Heidelberg
Reference21 articles.
1. Blaze, M., Diffie, W., Rivest, R.L., Schneier, B., Shimomura, T., Thompson, E., Wiener, M.: Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security: A Report by an Ad Hoc Group of Cryptographers and Computer Scientists. Technical report (January 1996), Available at:
http://www.counterpane.com/keylength.html
2. Certicom Corporation. Certicom ECC Challenges (2005),
http://www.certicom.com
3. CESYS GmbH. USB2FPGA Product Overview (January 2005),
http://www.cesys.com
4. Lecture Notes in Computer Science;R. Clayton,2003
5. Diffie, W., Hellman, M.E.: Exhaustive cryptanalysis of the NBS Data Encryption Standard. COMPUTER 10(6), 74–84 (1977)
Cited by
43 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Design and Implementation of Fast and Cost-Effective FPGA-Based Fuzzy Rainbow Tradeoffs;SN Computer Science;2023-04-15
2. A Survey on FPGA-Based Heterogeneous Clusters Architectures;IEEE Access;2023
3. Introduction and Background;Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers;2021-11-17
4. Util::Lookup;Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security;2021-11-12
5. On the Cost of ASIC Hardware Crackers: A SHA-1 Case Study;Topics in Cryptology – CT-RSA 2021;2021