Author:
Tan Lin,Zhu Xuanyong,Qi Wenfeng
Publisher
Springer International Publishing
Reference24 articles.
1. Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edn. Wiley, New York (1996)
2. Information Security and Cryptography;J Daemen,2002
3. Lidl, R., Niederreiter, H.: Introduction to Finite Fields and Their Applications, Revised edn. Cambridge University Press, Cambridge (1994)
4. Lecture Notes in Computer Science;A Bogdanov,2007
5. Lecture Notes in Computer Science;C De Cannière,2009
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Conditional Differential Cryptanalysis on Bagua;Innovative Security Solutions for Information Technology and Communications;2022