Funder
NSFC
National Cryptography Development Fund
the Project of Science and Technology of Guangdong
the Project of Science and Technology of Guangzhou
Publisher
Springer Science and Business Media LLC
Subject
Geometry and Topology,Theoretical Computer Science,Software
Reference36 articles.
1. Ahmadzadeh A, Hajihassani O, Gorgin S (2018) A high-performance and energy-efficient exhaustive key search approach via GPU on des-like cryptosystems. J Supercomput 74(1):160–182.
https://doi.org/10.1007/s11227-017-2120-9
2. Ahmed E, Chatzimisios P, Gupta BB, Jararweh Y, Song H (2018) Recent advances in fog and mobile edge computing. Trans Emerg Telecommun Technol.
https://doi.org/10.1002/ett.3307
3. Berbain C, Billet O, Gilbert H (2006) Efficient implementations of multivariate quadratic systems. In: Biham E, Youssef AM (eds) Selected areas in cryptography, 13th international workshop, SAC 2006, Montreal, Canada, August 17–18, 2006 Revised selected papers, Lecture notes in computer science, vol 4356, pp 174–187. Springer, New York.
https://doi.org/10.1007/978-3-540-74462-7_13
4. Chandramouli R, Iorga M, Chokhani S (2014) Cryptographic key management issues and challenges in cloud services. In: Secure cloud computing. Springer, New York, pp 1–30
5. Chen M, Chen T, Cheng C, Hsiao C, Yang RNB (2010) What price a provably secure stream cipher? Invited talk. 17th International Workshop, FSE 2010, Seoul, Korea, February 7-10. Available at
https://www.iacr.org/workshops/fse2010/content/slide/What%20price%20a%20provably%20secure%20stream%20cipher%20by%20Chen.pdf
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献