Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/646692.759487guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

The Block Cipher Rijndael

Published: 14 September 1998 Publication History

Abstract

No abstract available.

Cited By

View all
  • (2017)Efficient Branch and Bound on FPGAs Using Work Stealing and Instance-Specific DesignsACM Transactions on Reconfigurable Technology and Systems10.1145/305368710:3(1-23)Online publication date: 27-Jun-2017
  • (2017)Hardware coprocessors for high-performance symmetric cryptographyThe Journal of Supercomputing10.1007/s11227-016-1929-y73:6(2456-2482)Online publication date: 1-Jun-2017
  • (2016)Analysis and Validation of Active Eavesdropping Attacks in Passive FHSS RFID SystemsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2016.254130911:7(1528-1541)Online publication date: 1-Jul-2016
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
CARDIS '98: Proceedings of the The International Conference on Smart Card Research and Applications
September 1998
379 pages
ISBN:3540679235

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 14 September 1998

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 15 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2017)Efficient Branch and Bound on FPGAs Using Work Stealing and Instance-Specific DesignsACM Transactions on Reconfigurable Technology and Systems10.1145/305368710:3(1-23)Online publication date: 27-Jun-2017
  • (2017)Hardware coprocessors for high-performance symmetric cryptographyThe Journal of Supercomputing10.1007/s11227-016-1929-y73:6(2456-2482)Online publication date: 1-Jun-2017
  • (2016)Analysis and Validation of Active Eavesdropping Attacks in Passive FHSS RFID SystemsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2016.254130911:7(1528-1541)Online publication date: 1-Jul-2016
  • (2016)On the effective subkey space of some image encryption algorithms using external keyJournal of Visual Communication and Image Representation10.1016/j.jvcir.2016.06.00540:PA(51-57)Online publication date: 1-Oct-2016
  • (2015)SoteriaProceedings of the 31st Annual Computer Security Applications Conference10.1145/2818000.2856129(241-250)Online publication date: 7-Dec-2015
  • (2015)Differential fault attack on Zorro block cipherSecurity and Communication Networks10.1002/sec.12078:16(2826-2835)Online publication date: 10-Nov-2015
  • (2014)Improved block based segmentation algorithm for compression of compound imagesJournal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology10.5555/2699159.269920327:6(3213-3225)Online publication date: 1-Nov-2014
  • (2014)Improbable Differential Attacks on Serpent using Undisturbed BitsProceedings of the 7th International Conference on Security of Information and Networks10.1145/2659651.2659660(145-150)Online publication date: 9-Sep-2014
  • (2013)On the Homomorphic Computation of Symmetric Cryptographic PrimitivesProceedings of the 14th IMA International Conference on Cryptography and Coding - Volume 830810.1007/978-3-642-45239-0_3(28-44)Online publication date: 17-Dec-2013
  • (2012)Compact implementation and performance evaluation of hash functions in ATtiny devicesProceedings of the 11th international conference on Smart Card Research and Advanced Applications10.1007/978-3-642-37288-9_11(158-172)Online publication date: 28-Nov-2012
  • Show More Cited By

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media