Author:
Hakkala Antti,Isoaho Jouni,Virtanen Seppo
Publisher
Springer International Publishing
Reference53 articles.
1. Anwar, M.I., Virtanen, S., Isoaho, J.: A software defined approach for common baseband processing. J. Syst. Archit. 54, 769–786 (2008)
2. Ball, J., Borger, J., Greenwald, G.: Revealed: how US and UK spy agencies defeat internet privacy and security. http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security . 6 Sept 2013
3. Barrett, P.: Implementing the Rivest Shamir and Adleman public key encryption algorithm on a standard digital signal processor. In: Advances in Cryptology, pp. 311–323. Springer, New York (1987)
4. Bartolini, S., Giorgi, R., Martinelli, E.: Instruction set extensions for cryptographic applications. In: Koç, Ç.K. (ed.) Cryptographic Engineering, pp. 191–233. Springer, New York (2009)
5. Benadjila, R., Billet, O., Gueron, S., Robshaw, M.J.: The intel AES instructions set and the SHA-3 candidates. In: ASIACRYPT 2009: Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security, pp. 162–178. Springer, New York (2009)