Author:
Dhall Sakshi,Pal Saibal K.,Sharma Kapil
Reference68 articles.
1. Encyclopedia of Multimedia,2005
2. Digital Image Processing;Gonzalez,2007
3. Cryptography & Network Security Principles and Practices;Stallings,2004
4. Handbook of Applied Cryptography,1996
5. Biryukov, A., Dunkelman, O., Keller, N., Khovratovich, D., Shamir, A., Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds, EUROCRYPT 2010, Advances in Cryptology – EUROCRYPT 2010, Springer, pp. 299–319, 2010, doi: 10.1007/978-3-642-13190-5_15
Cited by
27 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献