Howard M. Heys
Orcid: 0000-0003-4506-3673
According to our database1,
Howard M. Heys
authored at least 53 papers
between 1994 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2022
Proceedings of the 2022 International Symposium on VLSI Design, Automation and Test, 2022
Proceedings of the 23rd International Symposium on Quality Electronic Design, 2022
Proceedings of the IEEE International Symposium on Circuits and Systems, 2022
2020
A Tutorial on the Implementation of Block Ciphers: Software and Hardware Applications.
IACR Cryptol. ePrint Arch., 2020
Key Dependency of Differentials: Experiments in the Differential Cryptanalysis of Block Ciphers Using Small S-boxes.
IACR Cryptol. ePrint Arch., 2020
2019
Integr., 2019
Using deep learning to combine static and dynamic power analyses of cryptographic circuits.
Int. J. Circuit Theory Appl., 2019
2018
Distributed Time-Memory Tradeoff Attacks on Ciphers (with Application to Stream Ciphers and Counter Mode).
IACR Cryptol. ePrint Arch., 2018
Template Attacks of a Masked S-Box Circuit: A Comparison Between Static and Dynamic Power Analyses.
Proceedings of the 16th IEEE International New Circuits and Systems Conference, 2018
2017
Template attacks based on static power analysis of block ciphers in 45-nm CMOS environment.
Proceedings of the IEEE 60th International Midwest Symposium on Circuits and Systems, 2017
2016
Secur. Commun. Networks, 2016
2015
Application of Simple Power Analysis to Stream Ciphers Constructed Using Feedback Shift Registers.
Comput. J., 2015
Proceedings of the IEEE 28th Canadian Conference on Electrical and Computer Engineering, 2015
Proceedings of the IEEE 28th Canadian Conference on Electrical and Computer Engineering, 2015
2014
Performance Characterization of AES Datapath Architectures in 90-nm Standard Cell CMOS Technology.
J. Signal Process. Syst., 2014
Performance Characterization of Pipelined S-Box Implementations for the Advanced Encryption Standard.
J. Circuits Syst. Comput., 2014
IET Inf. Secur., 2014
2013
FPGA Implementation and Energy Cost Analysis of Two Light-Weight Involutional Block Ciphers Targeted to Wireless Sensor Networks.
Mob. Networks Appl., 2013
Analytic modeling of interconnect capacitance in submicron and nanometer technologies.
Proceedings of the 2013 IEEE International Symposium on Circuits and Systems (ISCAS2013), 2013
Proceedings of the 26th IEEE Canadian Conference on Electrical and Computer Engineering CCECE 2013, 2013
A pipelined implementation of the grØstl hash algorithm and the advanced encryption standard.
Proceedings of the 26th IEEE Canadian Conference on Electrical and Computer Engineering CCECE 2013, 2013
Proceedings of the 26th IEEE Canadian Conference on Electrical and Computer Engineering CCECE 2013, 2013
2012
Secur. Commun. Networks, 2012
Applicability of simple power analysis to stream ciphers constructed using multiple LFSRs.
Proceedings of the 25th IEEE Canadian Conference on Electrical and Computer Engineering, 2012
Proceedings of the 25th IEEE Canadian Conference on Electrical and Computer Engineering, 2012
2011
Pipelined Statistical Cipher Feedback: A New Mode for High-Speed Self-Synchronizing Stream Encryption.
IEEE Trans. Computers, 2011
Proceedings of the 6th International ICST Conference on Communications and Networking in China, 2011
FPGA implementation of two involutional block ciphers targeted to wireless sensor networks.
Proceedings of the 6th International ICST Conference on Communications and Networking in China, 2011
2010
Proceedings of IEEE International Conference on Communications, 2010
2009
Proceedings of the 22nd Canadian Conference on Electrical and Computer Engineering, 2009
2008
IACR Cryptol. ePrint Arch., 2008
Compact ASIC implementation of the ICEBERG block cipher with concurrent error detection.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2008), 2008
Proceedings of the 11th Euromicro Conference on Digital System Design: Architectures, 2008
2007
Design and implementation of a scalable switch architecture for efficient high-speed data multicasting.
Int. J. Commun. Syst., 2007
An analytical approach to the performance evaluation of the balanced gamma switch under multicast traffic.
Int. J. Commun. Syst., 2007
2006
Proceedings of IEEE International Conference on Communications, 2006
Architecture and Performance Analysis of the Multicast Balanced Gamma Switch for Broadband Communications1.
Proceedings of the 2006 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2006), 2006
2005
A simple power analysis attack against the key schedule of the Camellia block cipher.
Inf. Process. Lett., 2005
IACR Cryptol. ePrint Arch., 2005
2003
IEEE Trans. Computers, 2003
Proceedings of the Topics in Cryptology, 2003
2002
Proceedings of the Information Security and Cryptology, 2002
Proceedings of the 11th International Conference on Computer Communications and Networks, 2002
2001
Proceedings of the Proceedings IEEE INFOCOM 2001, 2001
1998
1997
Resistance of a CAST-Like Encryption Algorithm to Linear and Differential Cryptanalysis.
Des. Codes Cryptogr., 1997
1996
Substitution-Permutation Networks Resistant to Differential and Linear Cryptanalysis.
J. Cryptol., 1996
Cryptologia, 1996
1995
IEEE Trans. Computers, 1995
1994
The Design of Substitution-Permutation Networks Resistant to Differential and Linear Cryptanalysis.
Proceedings of the CCS '94, 1994