Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Information Systems
Reference16 articles.
1. Rawat, A., Gupta, I., Goel, Y., & Sinha, N. (2015). Permutation based image encryption algorithm using BC approach. In Advances in computing, communications and informatics (ICACCI) (pp. 1877–1882).
2. Lagendijk, R. L., Erkin, Z., & Barni, M. (2013). Encrypted signal processing for privacy protection: Conveying the utility of homomorphic encryption and multiparty computation. IEEE Signal Processing Magazine,30(1), 82–105.
3. Li, L., Liu, B., & Wang, H. (2016). QTL: A new ultra-lightweight BC. Microprocessors and Microsystems,45(1), 45–55.
4. Hatzivasilis, G., Fysarakis, K., Papaefstathiou, I., & Manifavas, C. (2017). A review of lightweight BCs. Journal of Cryptographic Engineering,8, 141–184.
5. Subramanian, S., Mozaffari-Kermani, M., Azarderakhsh, R., & Nojoumian, M. (2017). Reliable H/W architectures for cryptographic BCs LED and HIGHT. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems,36(10), 1750–1758.
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献