Journals in DBLP
Çetin Kaya Koç , Christof Paar Guest Editors' Introduction to the Special Section on Cryptographic Hardware and Embedded Systems. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2003, v:52, n:4, pp:401-402 [Journal ] Marco Bucci , Lucia Germani , Raimondo Luzzi , Alessandro Trifiletti , Mario Varanonuovo A High-Speed Oscillator-Based Truly Random Number Source for Cryptographic Applications on a Smart Card IC. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2003, v:52, n:4, pp:403-409 [Journal ] Palash Sarkar , Subhamoy Maitra Efficient Implementation of Cryptographically Useful 'Large' Boolean Functions. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2003, v:52, n:4, pp:410-417 [Journal ] Rajendra S. Katti , Joseph Brennan Low Complexity Multiplication in a Finite Field Using Ring Representation. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2003, v:52, n:4, pp:418-427 [Journal ] Arash Reyhani-Masoleh , M. Anwarul Hasan Efficient Multiplication Beyond Optimal Normal Bases. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2003, v:52, n:4, pp:428-439 [Journal ] Colleen O'Rourke , Berk Sunar Achieving NTRU with Montgomery Multiplication. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2003, v:52, n:4, pp:440-448 [Journal ] Akashi Satoh , Kohji Takano A Scalable Dual-Field Elliptic Curve Cryptographic Processor. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2003, v:52, n:4, pp:449-460 [Journal ] Sung-Ming Yen , Seungjoo Kim , Seongan Lim , Sang-Jae Moon RSA Speedup with Chinese Remainder Theorem Immune against Hardware Fault Cryptanalysis. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2003, v:52, n:4, pp:461-472 [Journal ] Gaël Rouvroy , François-Xavier Standaert , Jean-Jacques Quisquater , Jean-Didier Legat Efficient Uses of FPGAs for Implementations of DES and Its Experimental Linear Cryptanalysis. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2003, v:52, n:4, pp:473-482 [Journal ] Stefan Mangard , Manfred Josef Aigner , Sandra Dominikus A Highly Regular and Scalable AES Hardware Architecture. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2003, v:52, n:4, pp:483-491 [Journal ] Guido Bertoni , Luca Breveglieri , Israel Koren , Paolo Maistri , Vincenzo Piuri Error Analysis and Detection Procedures for a Hardware Implementation of the Advanced Encryption Standard. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2003, v:52, n:4, pp:492-505 [Journal ] Tei-Wei Kuo , Yuan-Ting Kao , Chin-Fu Kuo Two-Version Based Concurrency Control and Recovery in Real-Time Client/Server Databases. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2003, v:52, n:4, pp:506-524 [Journal ] Laurence E. LaForge , Kirk F. Korver , M. Sami Fadali What Designers of Bus and Network Architectures Should Know about Hypercubes. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2003, v:52, n:4, pp:525-544 [Journal ]