Amanote Research
Register
Sign In
Discover open access scientific publications
Search, annotate, share and cite publications
Publications by Ryad Benadjila
The Intel AES Instructions Set and the SHA-3 Candidates
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Related publications
On Security Arguments of the Second Round SHA-3 Candidates
International Journal of Information Security
Information Systems
Risk
Computer Networks
Communications
Reliability
Safety
Quality
Software
Hardware Authentication Based on PUFs and SHA-3 2nd Round Candidates
Energy Comparison of AES and SHA-1 for Ubiquitous Computing
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Intel’s New AES Instructions for Enhanced Performance and Security
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Implementation of Hybrid Cryptosystem Using AES-256 and SHA-2 256 by LabVIEW
IJARCCE
Intel Galileo and Intel Galileo Gen 2
Meet-In-The-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Preimages for Reduced SHA-0 and SHA-1
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Power Analysis Resistant AES Implementation With Instruction Set Extensions
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science