• Camellia

  • Referenced in 88 articles [sw09731]
  • which includes encryption and decryption and key schedule, occupies approximately 11K gates, which...
  • Keccak

  • Referenced in 80 articles [sw09834]
  • block cipher without a key schedule. The choice of operations is limited to bitwise...
  • KATAN

  • Referenced in 54 articles [sw23742]
  • KTANTAN-n is the key schedule. The resulting ciphers are exteremly efficient in hardware...
  • Twofish

  • Referenced in 35 articles [sw13585]
  • boxes, and a relatively complex key schedule. One half...
  • XTEA

  • Referenced in 36 articles [sw36523]
  • apparent, including a somewhat more complex key-schedule and a rearrangement of the shifts, XORs...
  • tweakey

  • Referenced in 25 articles [sw12816]
  • advances on the topic of secure key schedule design...
  • SAFER

  • Referenced in 22 articles [sw21990]
  • number of rounds and the key schedule. More recent versions — SAFER+ and SAFER++ — were submitted...
  • FOX

  • Referenced in 22 articles [sw13586]
  • design of strong and efficient key-schedule algorithms. We provide evidence that FOX is immune...
  • CRYPTON

  • Referenced in 13 articles [sw23983]
  • some minor weakness in the key schedule and to remove some undesirable properties ... construction and key scheduling. This paper presents the revised version of CRYPTON and its preliminary...
  • EPCBC

  • Referenced in 6 articles [sw11640]
  • main cipher structure and customized key schedule design which provides strong protection against related...
  • npuScheduler

  • Referenced in 8 articles [sw25798]
  • mode, resource-constrained multi-project scheduling problem. Our key ideas are based on the concepts...
  • CHAM

  • Referenced in 2 articles [sw24780]
  • stateless-on-the-fly key schedule which does not require updating a key state. Regarding...
  • ASC-1

  • Referenced in 2 articles [sw19586]
  • round keys are generated by a key scheduling algorithm...
  • DBlock

  • Referenced in 1 article [sw13576]
  • efficiently improve the diffusion effect. For key schedule of DBlock, it basically employs the same...
  • SAND

  • Referenced in 1 article [sw41021]
  • relatively simple key schedule, which makes the ASIC round-based hardware implementation of SAND...
  • GPUTeraSort

  • Referenced in 14 articles [sw12706]
  • composed of billions of records and wide keys. Our algorithm uses the data parallelism within ... along with task parallelism by scheduling some of the memory-intensive and compute-intensive threads...
  • GreedEx

  • Referenced in 1 article [sw17812]
  • scalable clearing mechanism for utility computing. Scheduling becomes key in dynamic and heterogeneous utility computing...
  • LSSPER

  • Referenced in 29 articles [sw02485]
  • search for solving the resource-constrained project scheduling problem (RCPSP). At each step ... seen as a hybrid scheme. The key point of the method deals with the choice...
  • Slurm

  • Referenced in 17 articles [sw25056]
  • highly scalable cluster management and job scheduling system for large and small Linux clusters. Slurm ... cluster workload manager, Slurm has three key functions. First, it allocates exclusive and/or non-exclusive...