Publisher
NATURENGS MTU Journal of Engineering and Natural Sciences, Malatya Turgut Ozal University
Reference25 articles.
1. [1] Flores-Vergara, A., Garcia-Guerrero, E. E., Inzunza-González, E., López-Bonilla, O. R., Rodríguez-Orozco, E., Cardenas-Valdez, J. R., Tlelo-Cuautle, E. (2019). Implementing a chaotic cryptosystem in a 64-bit embedded system by using multiple-precision arithmetic, Nonlinear Dynamics, 96(1): 497-516.
2. [2] Yu, J.-Y.; Lee, E.; Oh, S.-R.; Seo, Y.-D.; Kim, Y.-G. (2020). A Survey on Security Requirements for WSNs: Focusing on the Characteristics Related to Security. IEEE Access, 8:45304–45324.
3. [3] Koç, Ç. (2009) Cryptographic Engineering. Springer, New York.
4. [4] Menezes, A.J., van Oorschot, P.C., Vanstone, S.A. (1996). Handbook of Applied Cryptography, 1st edn. CRC Press, Boca Raton
5. [5] Paar, C., Pelzl, J. (2009). Understanding cryptography: a textbook for students and practitioners, Universitat Bochum, Springer Publishing Company, Bochum, Germany.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献