• Camellia

  • Referenced in 71 articles [sw09731]
  • which includes encryption and decryption and key schedule, occupies approximately 11K gates, which...
  • Keccak

  • Referenced in 56 articles [sw09834]
  • block cipher without a key schedule. The choice of operations is limited to bitwise...
  • KATAN

  • Referenced in 45 articles [sw23742]
  • KTANTAN-n is the key schedule. The resulting ciphers are exteremly efficient in hardware...
  • Twofish

  • Referenced in 31 articles [sw13585]
  • boxes, and a relatively complex key schedule. One half...
  • FOX

  • Referenced in 21 articles [sw13586]
  • design of strong and efficient key-schedule algorithms. We provide evidence that FOX is immune...
  • tweakey

  • Referenced in 19 articles [sw12816]
  • advances on the topic of secure key schedule design...
  • SAFER

  • Referenced in 17 articles [sw21990]
  • number of rounds and the key schedule. More recent versions — SAFER+ and SAFER++ — were submitted...
  • CRYPTON

  • Referenced in 5 articles [sw23983]
  • some minor weakness in the key schedule and to remove some undesirable properties ... construction and key scheduling. This paper presents the revised version of CRYPTON and its preliminary...
  • EPCBC

  • Referenced in 5 articles [sw11640]
  • main cipher structure and customized key schedule design which provides strong protection against related...
  • ASC-1

  • Referenced in 2 articles [sw19586]
  • round keys are generated by a key scheduling algorithm...
  • CHAM

  • Referenced in 1 article [sw24780]
  • stateless-on-the-fly key schedule which does not require updating a key state. Regarding...
  • DBlock

  • Referenced in 1 article [sw13576]
  • efficiently improve the diffusion effect. For key schedule of DBlock, it basically employs the same...
  • GPUTeraSort

  • Referenced in 14 articles [sw12706]
  • composed of billions of records and wide keys. Our algorithm uses the data parallelism within ... along with task parallelism by scheduling some of the memory-intensive and compute-intensive threads...
  • GreedEx

  • Referenced in 1 article [sw17812]
  • scalable clearing mechanism for utility computing. Scheduling becomes key in dynamic and heterogeneous utility computing...
  • npuScheduler

  • Referenced in 2 articles [sw25798]
  • mode, resource-constrained multi-project scheduling problem. Our key ideas are based on the concepts...
  • KASUMI

  • Referenced in 20 articles [sw02926]
  • generator and in GPRS in the GEA3 key stream generator. KASUMI was designed for 3GPP ... European standards body ETSI.[2] Because of schedule pressures in 3GPP standardization, instead of developing...
  • DECAF

  • Referenced in 20 articles [sw04849]
  • results in agent architectures, including communication, planning, scheduling, execution monitoring, coordination, diagnosis, and learning. From ... middle-agents. This paper briefly describe the key portions of the DECAF toolkit...
  • Riscue

  • Referenced in 1 article [sw27548]
  • doing probabilistic risk analysis. Key application areas are: Cost and Schedule Risks; Hazard analysis; Reliability...
  • SuperMatrix

  • Referenced in 6 articles [sw20213]
  • SuperMatrix: a multithreaded runtime scheduling system for algorithms-by-blocks. This paper describes SuperMatrix ... parallelism from the library programmer. The key insight entails viewing matrices hierarchically, consisting of blocks ... aspect of the problem. Different heuristics for scheduling operations can be implemented in the runtime...