Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article; zbMATH DE number 2081069 - MaRDI portal

scientific article; zbMATH DE number 2081069

From MaRDI portal
Publication:4474178

zbMath1067.94563MaRDI QIDQ4474178

Akashi Satoh, Kohji Takano, Sumio Morioka, Seiji Munetoh

Publication date: 4 August 2004

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2248/22480239.htm

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (24)

A First-Order Leak-Free Masking CountermeasureA New Difference Method for Side-Channel Analysis with High-Dimensional Leakage ModelsLogic minimization techniques with applications to cryptologyAtomic-AES: A Compact Implementation of the AES Encryption/Decryption CoreImproved upper bounds for the expected circuit complexity of dense systems of linear equations over \(\mathrm{GF}(2)\)Higher-Order Side Channel Security and Mask RefreshingOn the Anonymization of Cocks IBE SchemeSpin me right round rotational symmetry for FPGA-specific AES: extended versionA Very Compact “Perfectly Masked” S-Box for AESFrom unbalanced to perfect: implementation of low energy stream ciphersUltra-Lightweight Implementations for Smart Devices – Security for 1000 Gate EquivalentsResource allocation in rooted trees for VLSI applicationsUsing Normal Bases for Compact Hardware Implementations of the AES S-BoxОб эксплуатационных качествах одного перспективного блочного шифра типа LSXRobust Encryption, RevisitedHow Fast Can Higher-Order Masking Be in Software?Higher-Order Masking in Practice: A Vector Implementation of Masked AES for ARM NEONResource allocation in rooted trees subject to sum constraints and nonlinear cost functionsCryptanalysis of CLEFIA Using Differential Methods with Cache Trace PatternsA Fast and Cache-Timing Resistant Implementation of the AESExploring Energy Efficiency of Lightweight Block CiphersEfficient systolic multiplications in composite fields for cryptographic systemsCancellation-free circuits in unbounded and bounded depthImplementing Grover oracles for quantum key search on AES and LowMC




This page was built for publication: