View Document Preview and Link
Document Date: 2009-06-16 09:09:11 Open Document File Size: 240,34 KB Share Result on Facebook
Company CBC / AMD / Bernstein / Intel / the AES / / Currency pence / / / IndustryTerm cryptographic software / constant-time software / conversion algorithm / public-key algorithms / software performance / software side-channel attacks / software instruction count / software implementation / compact hardware / software implementations / cryptographic algorithms / network applications / schedule computing / constant-time solution / reported software implementations / dedicated hardware / secret-key algorithms / online phase / format conversion algorithm / resistant software / expansion algorithm / exhaustive search / encryption algorithm / i7 processors / amd64 processors / multiplication algorithms / / Organization Department of Mathematics and Computer Science Technische Universiteit Eindhoven / European Commission / Flemish Government / Katholieke Universiteit Leuven / / Person Peter Schwabe Using / Peter Schwabe / / Position first author / second author / / Product amd64 processors / amd64 / / ProgrammingLanguage K / / RadioStation Core / / Technology encryption / Cryptography / 2 processor / RAM / i7 processors / multiplication algorithms / BroadBand Technology / amd64 processors / packet encryption / encryption algorithm / 65-nm processor / block cipher / 2 processors / public-key algorithms / conversion algorithm / secret key / simulation / secret-key algorithms / stream encryption / format conversion algorithm / key expansion algorithm / / SocialTag