Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
All the AES you need on Cortex-M3 and M4
This paper describes highly-optimized AES-{128,192,256\}-CTR assembly implementations
for the popular ARM Cortex-M3 and M4 embedded microprocessors. These …
for the popular ARM Cortex-M3 and M4 embedded microprocessors. These …
Fast software AES encryption
This paper presents new software speed records for AES-128 encryption for architectures at
both ends of the performance spectrum. On the one side we target the low-end 8-bit AVR …
both ends of the performance spectrum. On the one side we target the low-end 8-bit AVR …
Hardware acceleration of compression and encryption in SAP HANA
With the advent of cloud computing, where computational resources are expensive and data
movement needs to be secured and minimized, database management systems need to …
movement needs to be secured and minimized, database management systems need to …
Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards
X Li, W Qiu, D Zheng, K Chen… - IEEE Transactions on …, 2009 - ieeexplore.ieee.org
By exploiting a smart card, this paper presents a robust and efficient password-authenticated
key agreement scheme. This paper strengthens the security of the scheme by addressing …
key agreement scheme. This paper strengthens the security of the scheme by addressing …
New AES software speed records
This paper presents new speed records for AES software, taking advantage of (1)
architecture-dependent reduction of instructions used to compute AES and (2) …
architecture-dependent reduction of instructions used to compute AES and (2) …
Lightweight fault attack resistance in software using intra-instruction redundancy
Fault attack countermeasures can be implemented by storing or computing sensitive data in
redundant form, such that the faulty data can be detected and restored. We present a class …
redundant form, such that the faulty data can be detected and restored. We present a class …
Design and evaluation of a reconfigurable ECU architecture for secure and dependable automotive CPS
The next generation of automobiles integrate a multitude of electronic control units (ECUs) to
implement various automotive control and infotainment applications. However, recent works …
implement various automotive control and infotainment applications. However, recent works …
An integer linear programming approach for identifying instruction-set extensions
This paper presents an Integer Linear Programming (ILP) approach to the instruction-set
extension identification problem. An algorithm that iteratively generates and solves a set of …
extension identification problem. An algorithm that iteratively generates and solves a set of …
A differential-linear attack on 12-round Serpent
Serpent is an SP Network block cipher submitted to the AES competition and chosen as one
of its five finalists. The security of Serpent is widely acknowledged, especially as the best …
of its five finalists. The security of Serpent is widely acknowledged, especially as the best …
Security oriented design framework for EM side-channel protection in RTL implementations
Electromagnetic (EM) side-channel analysis is a powerful attack for extracting secret
information from cryptographic hardware implementations. Countermeasures have been …
information from cryptographic hardware implementations. Countermeasures have been …