| 2008 |
| 16 | EE | Huiju Cheng,
Howard M. Heys:
Compact ASIC implementation of the ICEBERG block cipher with concurrent error detection.
ISCAS 2008: 2921-2924 |
| 2007 |
| 15 | EE | Cheng Li,
Ramachandran Venkatesan,
Howard M. Heys:
An analytical approach to the performance evaluation of the balanced gamma switch under multicast traffic.
Int. J. Communication Systems 20(4): 427-460 (2007) |
| 14 | EE | Cheng Li,
Ramachandran Venkatesan,
Howard M. Heys:
Design and implementation of a scalable switch architecture for efficient high-speed data multicasting.
Int. J. Communication Systems 20(9): 1011-1036 (2007) |
| 2005 |
| 13 | EE | Lu Xiao,
Howard M. Heys:
A simple power analysis attack against the key schedule of the Camellia block cipher.
Inf. Process. Lett. 95(3): 409-412 (2005) |
| 2003 |
| 12 | | Kaisa Nyberg,
Howard M. Heys:
Selected Areas in Cryptography, 9th Annual International Workshop, SAC 2002, St. John's, Newfoundland, Canada, August 15-16, 2002. Revised Papers
Springer 2003 |
| 11 | EE | Lu Xiao,
Howard M. Heys:
Hardware Performance Characterization of Block Cipher Structures.
CT-RSA 2003: 176-192 |
| 10 | EE | Howard M. Heys:
Analysis of the Statistical Cipher Feedback Mode of Block Ciphers.
IEEE Trans. Computers 52(1): 77-92 (2003) |
| 2002 |
| 9 | EE | Lu Xiao,
Howard M. Heys:
Hardware Design and Analysisof Block Cipher Components.
ICISC 2002: 164-181 |
| 2001 |
| 8 | EE | Howard M. Heys:
An Analysis of the Statistical Self-Synchronization of Stream Ciphers.
INFOCOM 2001: 897-904 |
| 7 | | Howard M. Heys:
Information leakage of Feistel ciphers.
IEEE Transactions on Information Theory 47(1): 23-35 (2001) |
| 2000 |
| 6 | | Howard M. Heys,
Carlisle M. Adams:
Selected Areas in Cryptography, 6th Annual International Workshop, SAC'99, Kingston, Ontario, Canada, August 9-10, 1999, Proceedings
Springer 2000 |
| 1998 |
| 5 | EE | Helena Handschuh,
Howard M. Heys:
A Timing Attack on RC5.
Selected Areas in Cryptography 1998: 306-318 |
| 1997 |
| 4 | | J. Lee,
Howard M. Heys,
Stafford E. Tavares:
Resistance of a CAST-Like Encryption Algorithm to Linear and Differential Cryptanalysis.
Des. Codes Cryptography 12(3): 267-282 (1997) |
| 1996 |
| 3 | | Howard M. Heys,
Stafford E. Tavares:
Substitution-Permutation Networks Resistant to Differential and Linear Cryptanalysis.
J. Cryptology 9(1): 1-19 (1996) |
| 1995 |
| 2 | | Howard M. Heys,
Stafford E. Tavares:
Avalanche Characteristics of Substitution-Permutation Encryption Networks.
IEEE Trans. Computers 44(9): 1131-1139 (1995) |
| 1994 |
| 1 | EE | Howard M. Heys,
Stafford E. Tavares:
The Design of Substitution-Permutation Networks Resistant to Differential and Linear Cryptanalysis.
ACM Conference on Computer and Communications Security 1994: 148-155 |