default search action
Howard M. Heys
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c28]Zahra Heshmatpour, Lihong Zhang, Howard M. Heys:
Variation-Aware Analog Circuit Sizing in Carbon Nanotube. ISCAS 2022: 2891-2894 - [c27]Zahra Heshmatpour, Lihong Zhang, Howard M. Heys:
Multi-Objective Variation-Aware Sizing for Analog CNFET Circuits. ISQED 2022: 1-6 - [c26]Zahra Heshmatpour, Lihong Zhang, Howard M. Heys:
Robust CNFET Circuit Sizing Optimization. VLSI-DAT 2022: 1-4 - 2020
- [i5]Howard M. Heys:
Key Dependency of Differentials: Experiments in the Differential Cryptanalysis of Block Ciphers Using Small S-boxes. IACR Cryptol. ePrint Arch. 2020: 1349 (2020) - [i4]Howard M. Heys:
A Tutorial on the Implementation of Block Ciphers: Software and Hardware Applications. IACR Cryptol. ePrint Arch. 2020: 1545 (2020)
2010 – 2019
- 2019
- [j21]Jiming Xu, Howard M. Heys:
Using deep learning to combine static and dynamic power analyses of cryptographic circuits. Int. J. Circuit Theory Appl. 47(6): 971-990 (2019) - [j20]Jiming Xu, Howard M. Heys:
Kernel-based template attacks of cryptographic circuits using static power. Integr. 66: 67-79 (2019) - 2018
- [c25]Howard M. Heys:
Distributed Time-Memory Tradeoff Attacks on Ciphers - (with Application to Stream Ciphers and Counter Mode). ACISP 2018: 135-153 - [c24]Jiming Xu, Howard M. Heys:
Template Attacks of a Masked S-Box Circuit: A Comparison Between Static and Dynamic Power Analyses. NEWCAS 2018: 277-281 - [i3]Howard M. Heys:
Distributed Time-Memory Tradeoff Attacks on Ciphers (with Application to Stream Ciphers and Counter Mode). IACR Cryptol. ePrint Arch. 2018: 123 (2018) - 2017
- [j19]Howard M. Heys:
Statistical Cipher Feedback of Stream Ciphers. Comput. J. 60(12): 1839-1851 (2017) - [c23]Jiming Xu, Howard M. Heys:
Template attacks based on static power analysis of block ciphers in 45-nm CMOS environment. MWSCAS 2017: 1256-1259 - [e3]Roberto Avanzi, Howard M. Heys:
Selected Areas in Cryptography - SAC 2016 - 23rd International Conference, St. John's, NL, Canada, August 10-12, 2016, Revised Selected Papers. Lecture Notes in Computer Science 10532, Springer 2017, ISBN 978-3-319-69452-8 [contents] - 2016
- [j18]Howard M. Heys:
Error burst analysis of a statistical self-synchronizing mode of block ciphers. Secur. Commun. Networks 9(16): 3340-3352 (2016) - 2015
- [j17]Abdulah Abdulah Zadeh, Howard M. Heys:
Application of Simple Power Analysis to Stream Ciphers Constructed Using Feedback Shift Registers. Comput. J. 58(4): 961-972 (2015) - [c22]Yuanchi Tian, Howard M. Heys:
Hardware implementation of a high speed self-synchronizing cipher mode. CCECE 2015: 695-700 - [c21]Haohao Liao, Howard M. Heys:
An integrated hardware platform for four different lightweight block ciphers. CCECE 2015: 701-705 - 2014
- [j16]Abdulah Abdulah Zadeh, Howard M. Heys:
Simple power analysis applied to nonlinear feedback shift registers. IET Inf. Secur. 8(3): 188-198 (2014) - [j15]Cheng Wang, Howard M. Heys:
Performance Characterization of Pipelined S-Box Implementations for the Advanced Encryption Standard. J. Circuits Syst. Comput. 23(3) (2014) - [j14]Cheng Wang, Howard M. Heys:
Performance Characterization of AES Datapath Architectures in 90-nm Standard Cell CMOS Technology. J. Signal Process. Syst. 75(3): 217-231 (2014) - 2013
- [j13]Xueying Zhang, Howard M. Heys, Cheng Li:
FPGA Implementation and Energy Cost Analysis of Two Light-Weight Involutional Block Ciphers Targeted to Wireless Sensor Networks. Mob. Networks Appl. 18(2): 222-234 (2013) - [c20]Nazanin Askari, Howard M. Heys, Cecilia Moloney:
An extended visual cryptography scheme without pixel expansion for halftone images. CCECE 2013: 1-6 - [c19]Kai Guo, Howard M. Heys:
A pipelined implementation of the grØstl hash algorithm and the advanced encryption standard. CCECE 2013: 1-4 - [c18]Abdulah Abdulah Zadeh, Howard M. Heys:
Theoretical simple power analysis of the grain stream cipher. CCECE 2013: 1-5 - [c17]Gholamreza Shomalnasab, Howard M. Heys, Lihong Zhang:
Analytic modeling of interconnect capacitance in submicron and nanometer technologies. ISCAS 2013: 2553-2556 - 2012
- [j12]Xueying Zhang, Howard M. Heys, Cheng Li:
Energy efficiency of encryption schemes applied to wireless sensor networks. Secur. Commun. Networks 5(7): 789-808 (2012) - [c16]Nazanin Askari, Cecilia Moloney, Howard M. Heys:
A novel visual secret sharing scheme without image size expansion. CCECE 2012: 1-4 - [c15]Abdulah Abdulah Zadeh, Howard M. Heys:
Applicability of simple power analysis to stream ciphers constructed using multiple LFSRs. CCECE 2012: 1-6 - 2011
- [j11]Howard M. Heys, Liang Zhang:
Pipelined Statistical Cipher Feedback: A New Mode for High-Speed Self-Synchronizing Stream Encryption. IEEE Trans. Computers 60(11): 1581-1595 (2011) - [c14]Xueying Zhang, Howard M. Heys, Cheng Li:
FPGA implementation of two involutional block ciphers targeted to wireless sensor networks. CHINACOM 2011: 232-236 - [c13]Xueying Zhang, Howard M. Heys, Cheng Li:
Energy cost of cryptographic session key establishment in a wireless sensor network. CHINACOM 2011: 335-339 - 2010
- [c12]Xueying Zhang, Howard M. Heys, Cheng Li:
An Analysis of Link Layer Encryption Schemes in Wireless Sensor Networks. ICC 2010: 1-6
2000 – 2009
- 2009
- [c11]Cheng Wang, Howard M. Heys:
An ultra compact block cipher for serialized architecture implementations. CCECE 2009: 1085-1090 - 2008
- [c10]Huiju Cheng, Howard M. Heys, Cheng Wang:
PUFFIN: A Novel Compact Block Cipher Targeted to Embedded Digital Systems. DSD 2008: 383-390 - [c9]Huiju Cheng, Howard M. Heys:
Compact ASIC implementation of the ICEBERG block cipher with concurrent error detection. ISCAS 2008: 2921-2924 - [i2]Kashif Ali, Howard M. Heys:
Results from a Search for the Best Linear Approximation of a Block Cipher. IACR Cryptol. ePrint Arch. 2008: 76 (2008) - 2007
- [j10]Cheng Li, Ramachandran Venkatesan, Howard M. Heys:
An analytical approach to the performance evaluation of the balanced gamma switch under multicast traffic. Int. J. Commun. Syst. 20(4): 427-460 (2007) - [j9]Cheng Li, Ramachandran Venkatesan, Howard M. Heys:
Design and implementation of a scalable switch architecture for efficient high-speed data multicasting. Int. J. Commun. Syst. 20(9): 1011-1036 (2007) - 2006
- [c8]Cheng Li, Ramachandran Venkatesan, Howard M. Heys:
Architecture and Performance Analysis of the Multicast Balanced Gamma Switch for Broadband Communications1. AICCSA 2006: 381-388 - [c7]Cheng Li, Ramachandran Venkatesan, Howard M. Heys:
Performance Modelling of the Multicast Balanced Gamma Switch. ICC 2006: 806-813 - 2005
- [j8]Lu Xiao, Howard M. Heys:
A simple power analysis attack against the key schedule of the Camellia block cipher. Inf. Process. Lett. 95(3): 409-412 (2005) - [i1]Lu Xiao, Howard M. Heys:
An Improved Power Analysis Attack Against Camellia's Key Schedule. IACR Cryptol. ePrint Arch. 2005: 338 (2005) - 2003
- [j7]Howard M. Heys:
Analysis of the Statistical Cipher Feedback Mode of Block Ciphers. IEEE Trans. Computers 52(1): 77-92 (2003) - [c6]Lu Xiao, Howard M. Heys:
Hardware Performance Characterization of Block Cipher Structures. CT-RSA 2003: 176-192 - [e2]Kaisa Nyberg, Howard M. Heys:
Selected Areas in Cryptography, 9th Annual International Workshop, SAC 2002, St. John's, Newfoundland, Canada, August 15-16, 2002. Revised Papers. Lecture Notes in Computer Science 2595, Springer 2003, ISBN 3-540-00622-2 [contents] - 2002
- [j6]Howard M. Heys:
A Tutorial on Linear and Differential Cryptanalysis. Cryptologia 26(3): 189-221 (2002) - [c5]Cheng Li, Howard M. Heys, Ramachandran Venkatesan:
Design and implementation of the scalable multicast balanced gamma (BG) switch. ICCCN 2002: 518-521 - [c4]Lu Xiao, Howard M. Heys:
Hardware Design and Analysisof Block Cipher Components. ICISC 2002: 164-181 - 2001
- [j5]Howard M. Heys:
Information leakage of Feistel ciphers. IEEE Trans. Inf. Theory 47(1): 23-35 (2001) - [c3]Howard M. Heys:
An Analysis of the Statistical Self-Synchronization of Stream Ciphers. INFOCOM 2001: 897-904 - 2000
- [e1]Howard M. Heys, Carlisle M. Adams:
Selected Areas in Cryptography, 6th Annual International Workshop, SAC'99, Kingston, Ontario, Canada, August 9-10, 1999, Proceedings. Lecture Notes in Computer Science 1758, Springer 2000, ISBN 3-540-67185-4 [contents]
1990 – 1999
- 1998
- [c2]Helena Handschuh, Howard M. Heys:
A Timing Attack on RC5. Selected Areas in Cryptography 1998: 306-318 - 1997
- [j4]Joseph Lee, Howard M. Heys, Stafford E. Tavares:
Resistance of a CAST-Like Encryption Algorithm to Linear and Differential Cryptanalysis. Des. Codes Cryptogr. 12(3): 267-282 (1997) - 1996
- [j3]Howard M. Heys, Stafford E. Tavares:
Cryptanalysis of Substitution-Permutation Networks Using Key-Dependent Degeneracy. Cryptologia 20(3): 258-274 (1996) - [j2]Howard M. Heys, Stafford E. Tavares:
Substitution-Permutation Networks Resistant to Differential and Linear Cryptanalysis. J. Cryptol. 9(1): 1-19 (1996) - 1995
- [j1]Howard M. Heys, Stafford E. Tavares:
Avalanche Characteristics of Substitution-Permutation Encryption Networks. IEEE Trans. Computers 44(9): 1131-1139 (1995) - 1994
- [c1]Howard M. Heys, Stafford E. Tavares:
The Design of Substitution-Permutation Networks Resistant to Differential and Linear Cryptanalysis. CCS 1994: 148-155
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 20:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint