Subject
Artificial Intelligence,Information Systems and Management,Computer Science Applications,Theoretical Computer Science,Control and Systems Engineering,Software
Reference35 articles.
1. High-speed high-security signatures;Bernstein;J. Cryptogr. Eng.,2012
2. P4: programming protocol-independent packet processors;Bosshart;ACM SIGCOMM Comput. Commun. Rev.,2014
3. Forwarding metamorphosis: fast programmable match-action processing in hardware for sdn;Bosshart;ACM SIGCOMM Comput. Commun. Rev.,2013
4. The provable security of ed25519: theory and practice;Brendel,2021
5. Similarity estimation techniques from rounding algorithms;Charikar,2002
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献