Author:
Chang Jed Kao-Tung,Liu Chen,Gaudiot Jean-Luc
Publisher
Springer Berlin Heidelberg
Reference28 articles.
1. Luby, M., Rackoff, C.: How to Construct Pseudorandom Permutations from Pseudorandom Functions. SIAM Journal on Computing 17(2), 373–386 (1988)
2. Rijmen, V.: Cryptanalysis and design of iterated block ciphers. Doctoral Dissertation, K.U.Leuven (October 1997)
3. NIST (National Institute of Standards and Technology), “Advanced Encryption Standard (AES) – FIPS Pub. 197 (November 2001)
4. Rivest, R.L., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of ACM 21(2), 120–126 (1978)
5. Intel VTune,
http://software.intel.com/en-us/intel-vtune/
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献