If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • 2010

    Encrypting the internet

    Kounavis, M. E., Kang, X., Grewal, K., Eszenyi, M., Gueron, S. & Durham, D., 2010, SIGCOMM'10 - Proceedings of the SIGCOMM 2010 Conference. p. 135-146 12 p. (SIGCOMM'10 - Proceedings of the SIGCOMM 2010 Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Mitigating collision and preimage attacks against the generalized MDC-2 mode of operation

    Gueron, S. & Kounavis, M. E., 2010, IEEE Symposium on Computers and Communications, ISCC 2010. p. 196-201 6 p. 5546736. (Proceedings - IEEE Symposium on Computers and Communications).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2009

    Intel's new AES instructions for enhanced performance and security

    Gueron, S., 2009, Fast Software Encryption - 16th International Workshop, FSE 2009, Revised Selected Papers. p. 51-66 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5665 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • On the impossibility of detecting Virtual Machine monitors

    Gueron, S. & Seifert, J. P., 2009, Emerging Challenges for Security, Privacy and Trust - 24th IFIP TC 11 International Information Security Conference, SEC 2009, Proceedings. Gritzalis, D. & Lopez, J. (eds.). Springer New York LLC, p. 143-151 9 p. (IFIP Advances in Information and Communication Technology; vol. 297).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • The intel AES instructions set and the SHA-3 candidates

    Benadjila, R., Billet, O., Gueron, S. & Robshaw, M. J. B., 2009, Advances in Cryptology - ASIACRYPT 2009 - 15th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. p. 162-178 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5912 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • 2008

    A 2.1GHz 6.5mW 64-bit unified PopCount/BitScan datapath unit for 65nm high-performance microprocessor execution cores

    Ramanarayanan, R., Mathew, S., Erraguntla, V., Krishnamurthy, R. & Gueron, S., 2008, Proceedings - 21st International Conference on VLSI Design, VLSI DESIGN 2008. p. 273-278 6 p. 4450514. (Proceedings of the IEEE International Frequency Control Symposium and Exposition).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • A technique for accelerating characteristic 2 elliptic curve cryptography

    Gueron, S. & Kounavis, M., 2008, Proceedings - International Conference on Information Technology: New Generations, ITNG 2008. p. 265-272 8 p. 4492490. (Proceedings - International Conference on Information Technology: New Generations, ITNG 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Vortex: A new family of one-way hash functions based on AES rounds and carry-less multiplication

    Gueron, S. & Kounavis, M. E., 2008, Information Security - 11th International Conference, ISC 2008, Proceedings. p. 331-340 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5222 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2007

    New branch prediction vulnerabilities in OpenSSL and necessary software countermeasures

    Aciiçmez, O., Gueron, S. & Seifert, J. P., 2007, Cryptography and Coding - 11th IMA International Conference, Proceedings. Springer Verlag, p. 185-203 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4887 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2006

    Data and computational fault detection mechanism for devices that perform modular exponentiation

    Gueron, S., 2006, Fault Diagnosis and Tolerance in Cryptography - Third International Workshop, FDTC 2006, Proceedings. Springer Verlag, p. 80-87 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4236 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Is it wise to publish your public RSA keys?

    Gueron, S. & Seifert, J. P., 2006, Fault Diagnosis and Tolerance in Cryptography - Third International Workshop, FDTC 2006, Proceedings. Springer Verlag, p. 1-12 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4236 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2005

    Applications of the montgomery exponent

    Gueron, S. & Zuk, O., 2005, Proceedings ITCC 2005 - International Conference on Information Technology: Coding and Computing. Institute of Electrical and Electronics Engineers Inc., p. 620-625 6 p. (International Conference on Information Technology: Coding and Computing, ITCC; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review