dblp.uni-trier.dewww.uni-trier.de

Howard M. Heys

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
16EEHuiju Cheng, Howard M. Heys: Compact ASIC implementation of the ICEBERG block cipher with concurrent error detection. ISCAS 2008: 2921-2924
2007
15EECheng Li, Ramachandran Venkatesan, Howard M. Heys: An analytical approach to the performance evaluation of the balanced gamma switch under multicast traffic. Int. J. Communication Systems 20(4): 427-460 (2007)
14EECheng Li, Ramachandran Venkatesan, Howard M. Heys: Design and implementation of a scalable switch architecture for efficient high-speed data multicasting. Int. J. Communication Systems 20(9): 1011-1036 (2007)
2005
13EELu Xiao, Howard M. Heys: A simple power analysis attack against the key schedule of the Camellia block cipher. Inf. Process. Lett. 95(3): 409-412 (2005)
2003
12 Kaisa Nyberg, Howard M. Heys: Selected Areas in Cryptography, 9th Annual International Workshop, SAC 2002, St. John's, Newfoundland, Canada, August 15-16, 2002. Revised Papers Springer 2003
11EELu Xiao, Howard M. Heys: Hardware Performance Characterization of Block Cipher Structures. CT-RSA 2003: 176-192
10EEHoward M. Heys: Analysis of the Statistical Cipher Feedback Mode of Block Ciphers. IEEE Trans. Computers 52(1): 77-92 (2003)
2002
9EELu Xiao, Howard M. Heys: Hardware Design and Analysisof Block Cipher Components. ICISC 2002: 164-181
2001
8EEHoward M. Heys: An Analysis of the Statistical Self-Synchronization of Stream Ciphers. INFOCOM 2001: 897-904
7 Howard M. Heys: Information leakage of Feistel ciphers. IEEE Transactions on Information Theory 47(1): 23-35 (2001)
2000
6 Howard M. Heys, Carlisle M. Adams: Selected Areas in Cryptography, 6th Annual International Workshop, SAC'99, Kingston, Ontario, Canada, August 9-10, 1999, Proceedings Springer 2000
1998
5EEHelena Handschuh, Howard M. Heys: A Timing Attack on RC5. Selected Areas in Cryptography 1998: 306-318
1997
4 J. Lee, Howard M. Heys, Stafford E. Tavares: Resistance of a CAST-Like Encryption Algorithm to Linear and Differential Cryptanalysis. Des. Codes Cryptography 12(3): 267-282 (1997)
1996
3 Howard M. Heys, Stafford E. Tavares: Substitution-Permutation Networks Resistant to Differential and Linear Cryptanalysis. J. Cryptology 9(1): 1-19 (1996)
1995
2 Howard M. Heys, Stafford E. Tavares: Avalanche Characteristics of Substitution-Permutation Encryption Networks. IEEE Trans. Computers 44(9): 1131-1139 (1995)
1994
1EEHoward M. Heys, Stafford E. Tavares: The Design of Substitution-Permutation Networks Resistant to Differential and Linear Cryptanalysis. ACM Conference on Computer and Communications Security 1994: 148-155

Coauthor Index

1Carlisle M. Adams (Carlisle Adams) [6]
2Huiju Cheng [16]
3Helena Handschuh [5]
4J. Lee [4]
5Cheng Li [14] [15]
6Kaisa Nyberg [12]
7Stafford E. Tavares [1] [2] [3] [4]
8Ramachandran Venkatesan [14] [15]
9Lu Xiao [9] [11] [13]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)