default search action
William Diehl
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [i17]William Diehl:
MIPS Assembly Language Implementation of GIFT-64-128 Encryption. IACR Cryptol. ePrint Arch. 2022: 1388 (2022) - 2021
- [j6]Keyvan Ramezanpour, Paul Ampadu, William Diehl:
Fault intensity map analysis with neural network key distinguisher. J. Cryptogr. Eng. 11(3): 273-288 (2021) - 2020
- [j5]Mark Randolph, William Diehl:
Power Side-Channel Attack Analysis: A Review of 20 Years of Study for the Layman. Cryptogr. 4(2): 15 (2020) - [j4]Keyvan Ramezanpour, Paul Ampadu, William Diehl:
SCAUL: Power Side-Channel Analysis With Unsupervised Learning. IEEE Trans. Computers 69(11): 1626-1638 (2020) - [c21]Flora Coleman, Behnaz Rezvani, Sachin Sachin, William Diehl:
Side Channel Resistance at a Cost: A Comparison of ARX-Based Authenticated Encryption. FPL 2020: 193-199 - [c20]Keyvan Ramezanpour, Paul Ampadu, William Diehl:
RS-Mask: Random Space Masking as an Integrated Countermeasure against Power and Fault Analysis. HOST 2020: 176-187 - [c19]Luke Beckwith, William Diehl:
New Directions for NewHope: Improving Performance of Post-Quantum Cryptography through Algorithm-level Pipelining. FPT 2020: 120-128 - [c18]Anthony Demeri, William Diehl, Ahmad Salman:
SADDLE: Secure Aerial Data Delivery with Lightweight Encryption. SAI (3) 2020: 204-223 - [i16]Keyvan Ramezanpour, Paul Ampadu, William Diehl:
SCAUL: Power Side-Channel Analysis with Unsupervised Learning. CoRR abs/2001.05951 (2020) - [i15]Keyvan Ramezanpour, Paul Ampadu, William Diehl:
SCARL: Side-Channel Analysis with Reinforcement Learning on the Ascon Authenticated Cipher. CoRR abs/2006.03995 (2020) - [i14]Behnaz Rezvani, Thomas Conroy, Luke Beckwith, Matthew Bozzay, Trevor Laffoon, David McFeeters, Yijia Shi, Minh Vu, William Diehl:
Efficient Simultaneous Deployment of Multiple Lightweight Authenticated Ciphers. IACR Cryptol. ePrint Arch. 2020: 609 (2020)
2010 – 2019
- 2019
- [c17]Keyvan Ramezanpour, Paul Ampadu, William Diehl:
Fault Intensity Map Analysis with Neural Network Key Distinguisher. ASHES@CCS 2019: 33-42 - [c16]Keyvan Ramezanpour, Paul Ampadu, William Diehl:
FIMA: Fault Intensity Map Analysis. COSADE 2019: 63-79 - [c15]Keyvan Ramezanpour, Paul Ampadu, William Diehl:
A Statistical Fault Analysis Methodology for the Ascon Authenticated Cipher. HOST 2019: 41-50 - [c14]Kimia Zamiri Azar, Farnoud Farahmand, Hadi Mardani Kamali, Shervin Roshanisefat, Houman Homayoun, William Diehl, Kris Gaj, Avesta Sasan:
COMA: Communication and Obfuscation Management Architecture. RAID 2019: 181-195 - [c13]Abubakr Abdulgadir, William Diehl, Jens-Peter Kaps:
An Open-Source Platform for Evaluation of Hardware Implementations of Lightweight Authenticated Ciphers. ReConFig 2019: 1-5 - [i13]Kimia Zamiri Azar, Farnoud Farahmand, Hadi Mardani Kamali, Shervin Roshanisefat, Houman Homayoun, William Diehl, Kris Gaj, Avesta Sasan:
COMA: Communication and Obfuscation Management Architecture. CoRR abs/1909.00493 (2019) - [i12]Keyvan Ramezanpour, Paul Ampadu, William Diehl:
RS-Mask: Random Space Masking as an Integrated Countermeasure against Power and Fault Analysis. CoRR abs/1911.11278 (2019) - [i11]Anthony Demeri, Thomas Conroy, Alex Nolan, William Diehl:
The BIG Cipher: Design, Security Analysis, and Hardware-Software Optimization Techniques. IACR Cryptol. ePrint Arch. 2019: 22 (2019) - [i10]William Diehl, Farnoud Farahmand, Abubakr Abdulgadir, Jens-Peter Kaps, Kris Gaj:
Face-off between the CAESAR Lightweight Finalists: ACORN vs. Ascon. IACR Cryptol. ePrint Arch. 2019: 184 (2019) - [i9]William Diehl, Abubakr Abdulgadir, Jens-Peter Kaps:
Vulnerability Analysis of a Soft Core Processor through Fine-grain Power Profiling. IACR Cryptol. ePrint Arch. 2019: 742 (2019) - [i8]Behnaz Rezvani, William Diehl:
Hardware Implementations of NIST Lightweight Cryptographic Candidates: A First Look. IACR Cryptol. ePrint Arch. 2019: 824 (2019) - [i7]Jens-Peter Kaps, William Diehl, Michael Tempelmeier, Farnoud Farahmand, Ekawat Homsirikamol, Kris Gaj:
A Comprehensive Framework for Fair and Efficient Benchmarking of Hardware Implementations of Lightweight Cryptography. IACR Cryptol. ePrint Arch. 2019: 1273 (2019) - 2018
- [j3]William Diehl, Abubakr Abdulgadir, Jens-Peter Kaps, Kris Gaj:
Comparing the Cost of Protecting Selected Lightweight Block Ciphers against Differential Power Analysis in Low-Cost FPGAs. Comput. 7(2): 28 (2018) - [j2]William Diehl, Abubakr Abdulgadir, Farnoud Farahmand, Jens-Peter Kaps, Kris Gaj:
Comparison of Cost of Protection against Differential Power Analysis of Selected Authenticated Ciphers. Cryptogr. 2(3): 26 (2018) - [c12]William Diehl, Farnoud Farahmand, Abubakr Abdulgadir, Jens-Peter Kaps, Kris Gaj:
Fixing the CLOC with Fine-grain Leakage Analysis. ASHES@CCS 2018: 75-80 - [c11]Farnoud Farahmand, William Diehl, Abubakr Abdulgadir, Jens-Peter Kaps, Kris Gaj:
Improved Lightweight Implementations of CAESAR Authenticated Ciphers. FCCM 2018: 29-36 - [c10]William Diehl, Abubakr Abdulgadir, Farnoud Farahmand, Jens-Peter Kaps, Kris Gaj:
Comparison of cost of protection against differential power analysis of selected authenticated ciphers. HOST 2018: 147-152 - [i6]William Diehl, Abubakr Abdulgadir, Farnoud Farahmand, Jens-Peter Kaps, Kris Gaj:
Comparison of Cost of Protection Against Differential Power Analysis of Selected Authenticated Ciphers. IACR Cryptol. ePrint Arch. 2018: 341 (2018) - [i5]Farnoud Farahmand, William Diehl, Abubakr Abdulgadir, Jens-Peter Kaps, Kris Gaj:
Improved Lightweight Implementations of CAESAR Authenticated Ciphers. IACR Cryptol. ePrint Arch. 2018: 573 (2018) - 2017
- [j1]William Diehl, Kris Gaj:
RTL implementations and FPGA benchmarking of selected CAESAR Round Two authenticated ciphers. Microprocess. Microsystems 52: 202-218 (2017) - [c9]William Diehl, Farnoud Farahmand, Panasayya Yalla, Jens-Peter Kaps, Kris Gaj:
Comparison of hardware and software implementations of selected lightweight block ciphers. FPL 2017: 1-4 - [c8]William Diehl, Abubakr Abdulgadir, Jens-Peter Kaps, Kris Gaj:
Comparing the cost of protecting selected lightweight block ciphers against differential power analysis in low-cost FPGAs. FPT 2017: 128-135 - [c7]Ahmad Salman, William Diehl, Jens-Peter Kaps:
A light-weight hardware/software co-design for pairing-based cryptography with low power and energy consumption. FPT 2017: 235-238 - [c6]William Diehl, Abubakr Abdulgadir, Jens-Peter Kaps, Kris Gaj:
Side-channel resistant soft core processor for lightweight block ciphers. ReConFig 2017: 1-8 - [c5]Farnoud Farahmand, Ahmed Ferozpuri, William Diehl, Kris Gaj:
Minerva: Automated hardware optimization tool. ReConFig 2017: 1-8 - [i4]William Diehl:
Attack on AES Implementation Exploiting Publicly-visible Partial Result. IACR Cryptol. ePrint Arch. 2017: 788 (2017) - 2016
- [c4]William Diehl, Kris Gaj:
RTL Implementations and FPGA Benchmarking of Three Authenticated Ciphers Competing in CAESAR Round Two. DSD 2016: 91-98 - [c3]William Diehl, Kris Gaj:
Implementation of a Boolean Masking Scheme for the SCREAM Cipher. DSD 2016: 723-726 - [c2]William Diehl, Kris Gaj:
High-Speed RTL Implementations and FPGA Benchmarking of Three Authenticated Ciphers Competing in CAESAR Round Two. FCCM 2016: 93 - [i3]Ekawat Homsirikamol, William Diehl, Ahmed Ferozpuri, Farnoud Farahmand, Panasayya Yalla, Jens-Peter Kaps, Kris Gaj:
CAESAR Hardware API. IACR Cryptol. ePrint Arch. 2016: 626 (2016) - 2015
- [c1]Ekawat Homsirikamol, William Diehl, Ahmed Ferozpuri, Farnoud Farahmand, Malik Umar Sharif, Kris Gaj:
A universal hardware API for authenticated ciphers. ReConFig 2015: 1-8 - [i2]Ekawat Homsirikamol, William Diehl, Ahmed Ferozpuri, Farnoud Farahmand, Malik Umar Sharif, Kris Gaj:
GMU Hardware API for Authenticated Ciphers. IACR Cryptol. ePrint Arch. 2015: 669 (2015) - [i1]William Diehl:
Implementation of the SCREAM Tweakable Block Cipher in MSP430 Assembly Language. IACR Cryptol. ePrint Arch. 2015: 761 (2015)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:52 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint