Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,088,062 papers from all fields of science
Search
Sign In
Create Free Account
Advanced Encryption Standard process
Known as:
Aes2
, AES contest
, AES finalist
Expand
The Advanced Encryption Standard (AES), the symmetric block cipher ratified as a standard by National Institute of Standards and Technology of the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
27 relations
Backdoor (computing)
Block cipher
Block size (cryptography)
CAST-256
Expand
Broader (1)
History of cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
GMU Hardware API for Authenticated Ciphers
Ekawat Homsirikamol
,
William Diehl
,
Ahmed Ferozpuri
,
Farnoud Farahmand
,
Umar Sharif
,
K. Gaj
IACR Cryptology ePrint Archive
2015
Corpus ID: 33530632
In this paper, we propose a universal hardware Application Programming Interface (API) for authenticated ciphers. In particular…
Expand
2013
2013
Safety and Tolerability of Atomoxetine Hydrochloride in a Long-Term, Placebo-Controlled Randomized Withdrawal Study in European and Non-European Adults with Attention-Deficit/ Hyperactivity Disorder
A. Camporeale
,
H. Upadhyaya
,
+6 authors
A. Allen
2013
Corpus ID: 41209750
ABSTRACT � Background and Objectives: Safety and tolerability of atomoxetine were studied in the largest double-blind, placebo…
Expand
2012
2012
AES Encryption Algorithm Hardware Implementation: Throughput and Area Comparison of 128, 192 and 256-bits Key
Samir El
,
Naoufal Raissouni
2012
Corpus ID: 195707402
Advanced Encryption Standard (AES) adopted by the National Institute of Standards and Technology (NIST) to replace existing Data…
Expand
2011
2011
Parallelizing AES on multicores and GPUs
J. Ortega
,
H. Trefftz
,
C. Trefftz
IEEE International Conference on Electro…
2011
Corpus ID: 41779442
The AES block cipher cryptographic algorithm is widely used and it is resource intensive. An existing sequential open source…
Expand
2008
2008
Robust First Two Rounds Access Driven Cache Timing Attack on AES
Xinjie Zhao
,
Wang Tao
,
Mi Dong
,
Yuanyuan Zheng
,
Lü Zhaoyang
International Conference on Computer Science and…
2008
Corpus ID: 207929919
The memory Cache data access time uncertainty and resource multi-process sharing mechanism provide a new covert channel to leak…
Expand
2008
2008
Security enhancement of digital motion image transmission using hybrid AES-DES algorithm
M. Vishnu
,
S. Tiong
,
M. Zaini
,
S. Koh
Asia-Pacific Conference on Communications
2008
Corpus ID: 21099403
This paper presents the design and implementation of a symmetrical hybrid based 128 bit key AES-DES algorithm as a security…
Expand
2005
2005
An Efficient FPGA implementation of CCM mode using AES
Emmanuel López-Trejo
,
F. Rodríguez-Henríquez
,
A. Díaz-Pérez
2005
Corpus ID: 12831727
Due to the exponential growth of wireless and mobile applications, security has become a paramount design aspect. New techniques…
Expand
2000
2000
Performance of the AES Candidate Algorithms in Java
Andreas Sterbenz
,
P. Lipp
AES Candidate Conference
2000
Corpus ID: 9489317
We analyze the five remaining AES candidate algorithms MARS, RC6, Rijndael, Serpent, and Twofish as well as DES, Triple DES, and…
Expand
Review
2000
Review
2000
Hardware performance of the AES finalists-survey and analysis of results
K. Gaj
,
Pawel Chodowiec
2000
Corpus ID: 1716743
1999
1999
A Note on Comparing the AES Candidates
E. Biham
1999
Corpus ID: 10901580
The comparison of the AES candidates should take into consideration the security and the e ciency of the ciphers. However, due to…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE