A tutorial on linear and differential cryptanalysis HM Heys Cryptologia 26 (3), 189-221, 2002 | 438 | 2002 |
FPGA implementation of MD5 hash algorithm J Deepakumara, HM Heys, R Venkatesan Canadian Conference on Electrical and Computer Engineering 2001. Conference …, 2001 | 212 | 2001 |
Substitution-permutation networks resistant to differential and linear cryptanalysis HM Heys, SE Tavares Journal of cryptology 9 (1), 1-19, 1996 | 159 | 1996 |
Avalanche characteristics of substitution-permutation encryption networks HM Heys, SE Tavares IEEE Transactions on Computers 44 (9), 1131-1139, 1995 | 104 | 1995 |
Puffin: A novel compact block cipher targeted to embedded digital systems H Cheng, HM Heys, C Wang 2008 11th EUROMICRO Conference on Digital System Design Architectures …, 2008 | 95 | 2008 |
A timing attack on RC5 H Handschuh, HM Heys Selected Areas in Cryptography: 5th Annual International Workshop, SAC’98 …, 1999 | 95 | 1999 |
A new class of substitution-permutation networks AM Youssef, SE Tavares, HM Heys Workshop on Selected Areas in Cryptography, SAC 96, 132-147, 1996 | 70 | 1996 |
An extended visual cryptography scheme without pixel expansion for halftone images N Askari, HM Heys, CR Moloney 2013 26th IEEE Canadian Conference on Electrical and Computer Engineering …, 2013 | 66 | 2013 |
Energy efficiency of symmetric key cryptographic algorithms in wireless sensor networks X Zhang, HM Heys, C Li 2010 25th Biennial symposium on communications, 168-172, 2010 | 65 | 2010 |
On the security of the CAST encryption algorithm Heys, Tavares 1994 Proceedings of Canadian Conference on Electrical and Computer …, 1994 | 46 | 1994 |
The design of substitution-permutation networks resistant to differential and linear cryptanalysis HM Heys, SE Tavares Proceedings of the 2nd ACM Conference on Computer and Communications …, 1994 | 45 | 1994 |
Analysis of the statistical cipher feedback mode of block ciphers HM Heys IEEE Transactions on Computers 52 (1), 77-92, 2003 | 43 | 2003 |
Energy efficiency of encryption schemes applied to wireless sensor networks X Zhang, HM Heys, C Li Security and Communication Networks 5 (7), 789-808, 2012 | 34 | 2012 |
The design of product ciphers resistant to differential and linear cryptanalysis HM Heys, SE Tavares Journal of Cryptology 9 (1), 1-19, 1996 | 34 | 1996 |
Simple power analysis applied to nonlinear feedback shift registers AA Zadeh, HM Heys IET Information Security 8 (3), 188-198, 2014 | 32 | 2014 |
A novel visual secret sharing scheme without image size expansion N Askari, C Moloney, HM Heys 2012 25th IEEE Canadian Conference on Electrical and Computer Engineering …, 2012 | 29 | 2012 |
Hardware design and analysis of block cipher components L Xiao, HM Heys International Conference on Information Security and Cryptology, 164-181, 2002 | 27 | 2002 |
An ultra compact block cipher for serialized architecture implementations C Wang, HM Heys 2009 Canadian Conference on Electrical and Computer Engineering, 1085-1090, 2009 | 26 | 2009 |
Hardware implementation of the Salsa20 and Phelix stream ciphers J Yan, HM Heys 2007 Canadian Conference on Electrical and Computer Engineering, 1125-1128, 2007 | 26 | 2007 |
Performance comparison of message authentication code (MAC) algorithms for Internet protocol security (IPSEC) J Deepakumara, HM Heys, R Venkatesan Proc. Newfoundland Electrical and Computer Engineering Conf, 2003 | 26 | 2003 |