Author:
Noura Hassan N.,Salman Ola,Kaaniche Nesrine,Sklavos Nicolas,Chehab Ali,Couturier Raphaël
Funder
American University of Beirut
Subject
Artificial Intelligence,Computer Networks and Communications,Hardware and Architecture,Software
Reference43 articles.
1. Hardware security and trust;Sklavos,2017
2. A robust security framework with bit-flipping attack and timing attack for key derivation functions;Koh;IET Inf. Secur.,2020
3. Recommendation for block cipher modes of operation: methods and techniques;Dworkin,2001
4. Communication theory of secrecy systems;Shannon;Bell Syst. Tech. J.,1949
5. One round cipher algorithm for multimedia IoT devices;Noura;Multimed. Tools Appl.,2018
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献