Seguir
Howard Heys
Título
Citado por
Citado por
Año
A tutorial on linear and differential cryptanalysis
HM Heys
Cryptologia 26 (3), 189-221, 2002
4262002
FPGA implementation of MD5 hash algorithm
J Deepakumara, HM Heys, R Venkatesan
Canadian Conference on Electrical and Computer Engineering 2001. Conference …, 2001
2072001
Substitution-permutation networks resistant to differential and linear cryptanalysis
HM Heys, SE Tavares
Journal of cryptology 9 (1), 1-19, 1996
1561996
Avalanche characteristics of substitution-permutation encryption networks
HM Heys, SE Tavares
IEEE Transactions on Computers 44 (9), 1131-1139, 1995
1061995
Puffin: A novel compact block cipher targeted to embedded digital systems
H Cheng, HM Heys, C Wang
2008 11th EUROMICRO Conference on Digital System Design Architectures …, 2008
942008
A timing attack on RC5
H Handschuh, HM Heys
Selected Areas in Cryptography: 5th Annual International Workshop, SAC’98 …, 1999
921999
A new class of substitution-permutation networks
AM Youssef, SE Tavares, HM Heys
Workshop on Selected Areas in Cryptography, SAC 96, 132-147, 1996
671996
Energy efficiency of symmetric key cryptographic algorithms in wireless sensor networks
X Zhang, HM Heys, C Li
2010 25th Biennial symposium on communications, 168-172, 2010
662010
An extended visual cryptography scheme without pixel expansion for halftone images
N Askari, HM Heys, CR Moloney
2013 26th IEEE Canadian Conference on Electrical and Computer Engineering …, 2013
652013
On the security of the CAST encryption algorithm
Heys, Tavares
1994 Proceedings of Canadian Conference on Electrical and Computer …, 1994
491994
The design of substitution-permutation networks resistant to differential and linear cryptanalysis
HM Heys, SE Tavares
Proceedings of the 2nd ACM Conference on Computer and Communications …, 1994
441994
Analysis of the statistical cipher feedback mode of block ciphers
HM Heys
IEEE Transactions on Computers 52 (1), 77-92, 2003
422003
Energy efficiency of encryption schemes applied to wireless sensor networks
X Zhang, HM Heys, C Li
Security and Communication Networks 5 (7), 789-808, 2012
342012
Simple power analysis applied to nonlinear feedback shift registers
AA Zadeh, HM Heys
IET Information Security 8 (3), 188-198, 2014
322014
The design of product ciphers resistant to differential and linear cryptanalysis
HM Heys, SE Tavares
Journal of Cryptology 9 (1), 1-19, 1996
321996
A novel visual secret sharing scheme without image size expansion
N Askari, C Moloney, HM Heys
2012 25th IEEE Canadian Conference on Electrical and Computer Engineering …, 2012
302012
Hardware design and analysis of block cipher components
L Xiao, HM Heys
International Conference on Information Security and Cryptology, 164-181, 2002
272002
The FPGA implementation of the RC6 and CAST-256 encryption algorithms
M Riaz, HM Heys
Engineering Solutions for the Next Millennium. 1999 IEEE Canadian Conference …, 1999
271999
An ultra compact block cipher for serialized architecture implementations
C Wang, HM Heys
2009 Canadian Conference on Electrical and Computer Engineering, 1085-1090, 2009
262009
Hardware implementation of the Salsa20 and Phelix stream ciphers
J Yan, HM Heys
2007 Canadian Conference on Electrical and Computer Engineering, 1125-1128, 2007
262007
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20