Author:
Wang Lie,Luo Jie,Luo Guanlin,Gao Yajuan
Publisher
Springer Science and Business Media LLC
Reference23 articles.
1. Biham E, Dunkelman O, Keller N (2005) A related-key rectangle attack on the full KASUMI. Paper presented at the International Conference on the Theory and Application of Cryptology and Information Security
2. Burwick C, Coppersmith D, D’Avignon E, Gennaro R, Halevi S, Jutla C, Safford D (1998) MARS—a candidate cipher for AES. NIST AES Propos 268:80
3. Ceroici C, Latham K, Chee R, Greenlay B, Barber Q, Brown JA, Zemp R (2018) 3D photoacoustic imaging using Hadamard-bias encoding with a crossed electrode relaxor array. Opt Lett 43(14):3425–3428
4. Choo KKR (2018) Privacy on the line: the politics of wiretapping and encryption, updated and expanded edition. Comput J 51(6):744
5. Mohamed K, Ali FHHM, Ariffin S, Zakaria NH, Pauzi MNM (2018) An improved AES S-box based on fibonacci numbers and prime factor. IJ Netw Secur 20(6):1206–1214
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献