Follow
Howard Heys
Title
Cited by
Cited by
Year
A tutorial on linear and differential cryptanalysis
HM Heys
Cryptologia 26 (3), 189-221, 2002
3732002
FPGA implementation of MD5 hash algorithm
J Deepakumara, HM Heys, R Venkatesan
Canadian Conference on Electrical and Computer Engineering 2001. Conference …, 2001
1992001
Substitution-permutation networks resistant to differential and linear cryptanalysis
HM Heys, SE Tavares
Journal of cryptology 9 (1), 1-19, 1996
1551996
Avalanche characteristics of substitution-permutation encryption networks
HM Heys, SE Tavares
IEEE Transactions on Computers 44 (9), 1131-1139, 1995
991995
A timing attack on RC5
H Handschuh, HM Heys
Selected Areas in Cryptography: 5th Annual International Workshop, SAC’98 …, 1999
861999
Puffin: A novel compact block cipher targeted to embedded digital systems
H Cheng, HM Heys, C Wang
2008 11th EUROMICRO Conference on Digital System Design Architectures …, 2008
852008
Energy efficiency of symmetric key cryptographic algorithms in wireless sensor networks
X Zhang, HM Heys, C Li
2010 25th Biennial symposium on communications, 168-172, 2010
662010
A new class of substitution-permutation networks
AM Youssef, SE Tavares, HM Heys
Workshop on Selected Areas in Cryptography, SAC 96, 132-147, 1996
661996
An extended visual cryptography scheme without pixel expansion for halftone images
N Askari, HM Heys, CR Moloney
2013 26th IEEE Canadian Conference on Electrical and Computer Engineering …, 2013
612013
On the security of the CAST encryption algorithm
HM Heys, SE Tavares
Canadian Conference on Electrical and Computer Engineering, 332-335, 1994
441994
Analysis of the statistical cipher feedback mode of block ciphers
HM Heys
IEEE Transactions on Computers 52 (1), 77-92, 2003
422003
The design of substitution-permutation networks resistant to differential and linear cryptanalysis
HM Heys, SE Tavares
Proceedings of the 2nd ACM Conference on Computer and Communications …, 1994
381994
A novel visual secret sharing scheme without image size expansion
N Askari, C Moloney, HM Heys
2012 25th IEEE Canadian Conference on Electrical and Computer Engineering …, 2012
312012
Simple power analysis applied to nonlinear feedback shift registers
AA Zadeh, HM Heys
IET Information Security 8 (3), 188-198, 2014
302014
Energy efficiency of encryption schemes applied to wireless sensor networks
X Zhang, HM Heys, C Li
Security and Communication Networks 5 (7), 789-808, 2012
302012
Performance comparison of message authentication code (MAC) algorithms for Internet protocol security (IPSEC)
J Deepakumara, HM Heys, R Venkatesan
Proc. Newfoundland Electrical and Computer Engineering Conf, 2003
262003
Hardware design and analysis of block cipher components
L Xiao, HM Heys
Information Security and Cryptology—ICISC 2002: 5th International …, 2003
262003
An analysis of the statistical self-synchronization of stream ciphers
HM Heys
Proceedings IEEE INFOCOM 2001. Conference on Computer Communications …, 2001
262001
The FPGA implementation of the RC6 and CAST-256 encryption algorithms
M Riaz, HM Heys
Engineering Solutions for the Next Millennium. 1999 IEEE Canadian Conference …, 1999
261999
Hardware implementation of the Salsa20 and Phelix stream ciphers
J Yan, HM Heys
2007 Canadian Conference on Electrical and Computer Engineering, 1125-1128, 2007
252007
The system can't perform the operation now. Try again later.
Articles 1–20