2008 |
16 | EE | Huiju Cheng,
Howard M. Heys:
Compact ASIC implementation of the ICEBERG block cipher with concurrent error detection.
ISCAS 2008: 2921-2924 |
2007 |
15 | EE | Cheng Li,
Ramachandran Venkatesan,
Howard M. Heys:
An analytical approach to the performance evaluation of the balanced gamma switch under multicast traffic.
Int. J. Communication Systems 20(4): 427-460 (2007) |
14 | EE | Cheng Li,
Ramachandran Venkatesan,
Howard M. Heys:
Design and implementation of a scalable switch architecture for efficient high-speed data multicasting.
Int. J. Communication Systems 20(9): 1011-1036 (2007) |
2005 |
13 | EE | Lu Xiao,
Howard M. Heys:
A simple power analysis attack against the key schedule of the Camellia block cipher.
Inf. Process. Lett. 95(3): 409-412 (2005) |
2003 |
12 | | Kaisa Nyberg,
Howard M. Heys:
Selected Areas in Cryptography, 9th Annual International Workshop, SAC 2002, St. John's, Newfoundland, Canada, August 15-16, 2002. Revised Papers
Springer 2003 |
11 | EE | Lu Xiao,
Howard M. Heys:
Hardware Performance Characterization of Block Cipher Structures.
CT-RSA 2003: 176-192 |
10 | EE | Howard M. Heys:
Analysis of the Statistical Cipher Feedback Mode of Block Ciphers.
IEEE Trans. Computers 52(1): 77-92 (2003) |
2002 |
9 | EE | Lu Xiao,
Howard M. Heys:
Hardware Design and Analysisof Block Cipher Components.
ICISC 2002: 164-181 |
2001 |
8 | EE | Howard M. Heys:
An Analysis of the Statistical Self-Synchronization of Stream Ciphers.
INFOCOM 2001: 897-904 |
7 | | Howard M. Heys:
Information leakage of Feistel ciphers.
IEEE Transactions on Information Theory 47(1): 23-35 (2001) |
2000 |
6 | | Howard M. Heys,
Carlisle M. Adams:
Selected Areas in Cryptography, 6th Annual International Workshop, SAC'99, Kingston, Ontario, Canada, August 9-10, 1999, Proceedings
Springer 2000 |
1998 |
5 | EE | Helena Handschuh,
Howard M. Heys:
A Timing Attack on RC5.
Selected Areas in Cryptography 1998: 306-318 |
1997 |
4 | | J. Lee,
Howard M. Heys,
Stafford E. Tavares:
Resistance of a CAST-Like Encryption Algorithm to Linear and Differential Cryptanalysis.
Des. Codes Cryptography 12(3): 267-282 (1997) |
1996 |
3 | | Howard M. Heys,
Stafford E. Tavares:
Substitution-Permutation Networks Resistant to Differential and Linear Cryptanalysis.
J. Cryptology 9(1): 1-19 (1996) |
1995 |
2 | | Howard M. Heys,
Stafford E. Tavares:
Avalanche Characteristics of Substitution-Permutation Encryption Networks.
IEEE Trans. Computers 44(9): 1131-1139 (1995) |
1994 |
1 | EE | Howard M. Heys,
Stafford E. Tavares:
The Design of Substitution-Permutation Networks Resistant to Differential and Linear Cryptanalysis.
ACM Conference on Computer and Communications Security 1994: 148-155 |