Author:
Ma Xiaowen,Wang Maoning,Kang Zhong
Publisher
Springer Nature Singapore
Reference28 articles.
1. Aaraj, N., Raghunathan, A., Jha, N.K.: Analysis and design of a hardware/software trusted platform module for embedded systems. ACM Trans. Embedded Comput. Syst. (TECS) 8(1), 1–31 (2009)
2. Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for non-cryptographic fault-tolerant distributed computation. In: Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali, pp. 351–371 (2019)
3. Lecture Notes in Computer Science;D Bogdanov,2008
4. Chaum, D., Crépeau, C., Damgard, I.: Multiparty unconditionally secure protocols. In: Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, pp. 11–19 (1988)
5. Chen, J.: A note on the impossible differential attacks on block cipher SM4. In: 2016 12th International Conference on Computational Intelligence and Security (CIS), pp. 551–554. IEEE (2016)