关注
Howard Heys
标题
引用次数
引用次数
年份
A tutorial on linear and differential cryptanalysis
HM Heys
Cryptologia 26 (3), 189-221, 2002
4382002
FPGA implementation of MD5 hash algorithm
J Deepakumara, HM Heys, R Venkatesan
Canadian Conference on Electrical and Computer Engineering 2001. Conference …, 2001
2122001
Substitution-permutation networks resistant to differential and linear cryptanalysis
HM Heys, SE Tavares
Journal of cryptology 9 (1), 1-19, 1996
1591996
Avalanche characteristics of substitution-permutation encryption networks
HM Heys, SE Tavares
IEEE Transactions on Computers 44 (9), 1131-1139, 1995
1041995
Puffin: A novel compact block cipher targeted to embedded digital systems
H Cheng, HM Heys, C Wang
2008 11th EUROMICRO Conference on Digital System Design Architectures …, 2008
952008
A timing attack on RC5
H Handschuh, HM Heys
Selected Areas in Cryptography: 5th Annual International Workshop, SAC’98 …, 1999
951999
A new class of substitution-permutation networks
AM Youssef, SE Tavares, HM Heys
Workshop on Selected Areas in Cryptography, SAC 96, 132-147, 1996
701996
An extended visual cryptography scheme without pixel expansion for halftone images
N Askari, HM Heys, CR Moloney
2013 26th IEEE Canadian Conference on Electrical and Computer Engineering …, 2013
662013
Energy efficiency of symmetric key cryptographic algorithms in wireless sensor networks
X Zhang, HM Heys, C Li
2010 25th Biennial symposium on communications, 168-172, 2010
652010
On the security of the CAST encryption algorithm
Heys, Tavares
1994 Proceedings of Canadian Conference on Electrical and Computer …, 1994
461994
The design of substitution-permutation networks resistant to differential and linear cryptanalysis
HM Heys, SE Tavares
Proceedings of the 2nd ACM Conference on Computer and Communications …, 1994
451994
Analysis of the statistical cipher feedback mode of block ciphers
HM Heys
IEEE Transactions on Computers 52 (1), 77-92, 2003
432003
Energy efficiency of encryption schemes applied to wireless sensor networks
X Zhang, HM Heys, C Li
Security and Communication Networks 5 (7), 789-808, 2012
342012
The design of product ciphers resistant to differential and linear cryptanalysis
HM Heys, SE Tavares
Journal of Cryptology 9 (1), 1-19, 1996
341996
Simple power analysis applied to nonlinear feedback shift registers
AA Zadeh, HM Heys
IET Information Security 8 (3), 188-198, 2014
322014
A novel visual secret sharing scheme without image size expansion
N Askari, C Moloney, HM Heys
2012 25th IEEE Canadian Conference on Electrical and Computer Engineering …, 2012
292012
Hardware design and analysis of block cipher components
L Xiao, HM Heys
International Conference on Information Security and Cryptology, 164-181, 2002
272002
An ultra compact block cipher for serialized architecture implementations
C Wang, HM Heys
2009 Canadian Conference on Electrical and Computer Engineering, 1085-1090, 2009
262009
Hardware implementation of the Salsa20 and Phelix stream ciphers
J Yan, HM Heys
2007 Canadian Conference on Electrical and Computer Engineering, 1125-1128, 2007
262007
Performance comparison of message authentication code (MAC) algorithms for Internet protocol security (IPSEC)
J Deepakumara, HM Heys, R Venkatesan
Proc. Newfoundland Electrical and Computer Engineering Conf, 2003
262003
系统目前无法执行此操作,请稍后再试。
文章 1–20