Follow
Howard Heys
Title
Cited by
Cited by
Year
A tutorial on linear and differential cryptanalysis
HM Heys
Cryptologia 26 (3), 189-221, 2002
3582002
FPGA implementation of MD5 hash algorithm
J Deepakumara, HM Heys, R Venkatesan
Canadian Conference on Electrical and Computer Engineering 2001. Conference …, 2001
1892001
Substitution-permutation networks resistant to differential and linear cryptanalysis
HM Heys, SE Tavares
Journal of cryptology 9 (1), 1-19, 1996
1531996
Avalanche characteristics of substitution-permutation encryption networks
HM Heys, SE Tavares
IEEE Transactions on Computers 44 (9), 1131-1139, 1995
971995
A timing attack on RC5
H Handschuh, HM Heys
International Workshop on Selected Areas in Cryptography, 306-318, 1998
811998
Puffin: A novel compact block cipher targeted to embedded digital systems
H Cheng, HM Heys, C Wang
2008 11th EUROMICRO Conference on Digital System Design Architectures …, 2008
762008
Energy efficiency of symmetric key cryptographic algorithms in wireless sensor networks
X Zhang, HM Heys, C Li
2010 25th Biennial symposium on communications, 168-172, 2010
632010
A new class of substitution-permutation networks
AM Youssef, SE Tavares, HM Heys
Workshop on Selected Areas in Cryptography, SAC 96, 132-147, 1996
631996
An extended visual cryptography scheme without pixel expansion for halftone images
N Askari, HM Heys, CR Moloney
2013 26th IEEE Canadian Conference on Electrical and Computer Engineering …, 2013
612013
On the security of the CAST encryption algorithm
HM Heys, SE Tavares
Canadian Conference on Electrical and Computer Engineering, 332-335, 1994
431994
Analysis of the statistical cipher feedback mode of block ciphers
HM Heys
IEEE Transactions on Computers 52 (1), 77-92, 2003
392003
The design of substitution-permutation networks resistant to differential and linear cryptanalysis
HM Heys, SE Tavares
Proceedings of the 2nd ACM Conference on Computer and Communications …, 1994
351994
Simple power analysis applied to nonlinear feedback shift registers
AA Zadeh, HM Heys
IET Information Security 8 (3), 188-198, 2014
302014
A novel visual secret sharing scheme without image size expansion
N Askari, C Moloney, HM Heys
2012 25th IEEE Canadian Conference on Electrical and Computer Engineering …, 2012
302012
The design of product ciphers resistant to differential and linear cryptanalysis
HM Heys, SE Tavares
Journal of Cryptology 9 (1), 1-19, 1996
281996
Energy efficiency of encryption schemes applied to wireless sensor networks
X Zhang, HM Heys, C Li
Security and Communication Networks 5 (7), 789-808, 2012
272012
Performance comparison of message authentication code (MAC) algorithms for Internet protocol security (IPSEC)
J Deepakumara, HM Heys, R Venkatesan
Proc. Newfoundland Electrical and Computer Engineering Conf, 2003
262003
An analysis of the statistical self-synchronization of stream ciphers
HM Heys
Proceedings IEEE INFOCOM 2001. Conference on Computer Communications …, 2001
262001
The FPGA implementation of the RC6 and CAST-256 encryption algorithms
M Riaz, HM Heys
Engineering Solutions for the Next Millennium. 1999 IEEE Canadian Conference …, 1999
261999
Hardware implementation of the Salsa20 and Phelix stream ciphers
J Yan, HM Heys
2007 Canadian Conference on Electrical and Computer Engineering, 1125-1128, 2007
252007
The system can't perform the operation now. Try again later.
Articles 1–20