Skip to search formSkip to main contentSkip to account menu
You are currently offline. Some features of the site may not work correctly.

AES instruction set

Known as: AES-NI, AES, AES acceleration 
Advanced Encryption Standard Instruction Set (or the Intel Advanced Encryption Standard New Instructions; AES-NI) is an extension to the x86… 
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2018
Highly Cited
2018
Three-dimensional geometric data offer an excellent domain for studying representation learning and generative modeling. In this… 
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 2
Highly Cited
2015
Highly Cited
2015
We design and develop ObliVM, a programming framework for secure computation. ObliVM offers a domain specific language designed… 
  • table I
  • figure 1
  • figure 2
  • figure 3
  • table II
Highly Cited
2014
Highly Cited
2014
At PKC 2010 Smart and Vercauteren presented a variant of Gentry’s fully homomorphic public key encryption scheme and mentioned… 
Highly Cited
2011
Highly Cited
2011
Secure end-to-end communication is becoming increasingly important as more private and sensitive data is transferred on the… 
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Highly Cited
2005
Highly Cited
2005
During the last years, several masking schemes for AES have been proposed to secure hardware implementations against DPA attacks… 
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Highly Cited
2000
Highly Cited
2000
This report describes our evaluation results of implementing hardware of the AES finalists, concentrating on 128-bit key version… 
  • figure 3.1
Highly Cited
2000
Highly Cited
2000
The technical analysis used in determining which of the Advanced Encryption Standard candidates will be selected as the Advanced… 
  • table 1
  • table 2
  • table 3
  • table 4
  • figure 1
Highly Cited
2000
Highly Cited
2000
We present a new 128-bit block cipher called Camellia. Camellia supports 128-bit block size and 128-, 192-, and 256-bit keys, i.e… 
  • figure 1
  • table 1
  • figure 2
  • table 2
  • table 3
Highly Cited
2000
Highly Cited
2000
Techniques to protect software implementations of the AES candidate algorithms from power analysis attacks are investigated. New… 
  • table 1
  • table 2
Highly Cited
1999
Highly Cited
1999
  • Dirk Fox
  • Datenschutz und Datensicherheit
  • 1999
  • Corpus ID: 31476420
Im Jahre 1977 wurde der „Data Encryption Algorithm“ (DEA) vom „National Bureau of Standards“ (NBS, später „National Institute of…