Publisher
Springer Science and Business Media LLC
Reference52 articles.
1. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)
2. Blakley, G.R.: Safeguarding cryptographic keys. In: Proceedings of the National Computer Conference, vol. 48 (1979)
3. Almazrooie, M.; Samsudin, A.; Gutub, A.; Salleh, M.S.; Omar, M.A.; Hassan S.A.: Integrity verification for digital Holy Quran verses using cryptographic hash function and compression. J. King Saud Univ. Comput. Inf. Sci. (2018)
4. Alassaf, N.; Gutub, A.; Parah, S.; Al Ghamdi, M.: Enhancing speed of SIMON: a light-weight-cryptographic algorithm for IoT applications. Multimed. Tools Appl. Int. J (2018). https://doi.org/10.1007/s11042-018-6801-z
5. Gutub, A.; Tenca, A.F.: Efficient scalable VLSI architecture for Montgomery inversion in GF (p). Integr. VLSI J. 37(2), 103–120 (2004)
Cited by
45 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献