Author:
Gouvêa Conrado P. L.,López Julio
Publisher
Springer Berlin Heidelberg
Reference19 articles.
1. Lecture Notes in Computer Science;M. Bellare,2004
2. Chai, Q., Gong, G.: A cryptanalysis of HummingBird-2: The differential sequence analysis. Cryptology ePrint Archive, Report 2012/233 (2012),
http://eprint.iacr.org/
3. Lecture Notes in Computer Science;S. Chatterjee,2012
4. Didla, S., Ault, A., Bagchi, S.: Optimizing AES for embedded devices and wireless sensor networks. In: Proceedings of the 4th International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, pp. 4:1–4:10 (2008)
5. Lecture Notes in Computer Science;D. Engels,2012
Cited by
16 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献