You cannot select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
odzhan f5c1beecb6 upd 3 years ago
..
Applied Cryptography Engineering — Quarrelsome_files upd 3 years ago
A Specification for Rijndael, the AES Algorithm.pdf upd 3 years ago
A Very Compact Perfectly Masked S-Box.pdf upd 3 years ago
A Very Compact S-box for AES.pdf upd 3 years ago
ADVANCED ENCRYPTION STANDARD (AES).pdf upd 3 years ago
An Efficient Pipelined Multiplicative Inverse Architecture.pdf upd 3 years ago
Applied Cryptography Engineering — Quarrelsome.htm upd 3 years ago
DPA, Bitslicing and Masking at 1 GHz.pdf upd 3 years ago
Efficient Software.pdf upd 3 years ago
How Far Can We Go on the x64 Processors.pdf upd 3 years ago
Parallel AES Encryption with Modified Mix-columns For Many Core Processor Arrays.pdf upd 3 years ago
Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors.pdf upd 3 years ago
Securing the AES Finalists Against Power Analysis Attacks.pdf upd 3 years ago
Side-Channel Analysis Resistant.pdf upd 3 years ago
Side-Channel Attacks Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing.pdf upd 3 years ago
The design of Rijndael.pdf upd 3 years ago
Ultra-lightweight 8-bit Multiplicative Inverse.pdf upd 3 years ago
aes.html upd 3 years ago
cache.pdf upd 3 years ago
ecb_e_m.txt upd 3 years ago
rfc3686.txt upd 3 years ago
tweet.c upd 3 years ago