Author:
Wang Xiangru,Wei Yuechuan,Chang Lipeng,Pan Xiaozhong
Reference13 articles.
1. Authentication Algorithms in WSN: A Survey Based on Procedures and Methods[J]. Wireless Personal Communications, 2021, 123(3).
2. Hardware Performance Evaluation of Authenticated Encryption SAEAES with Threshold Implementation[J];Takeshi;Cryptography,2020
3. Parallelizable Message Preprocessing for Merkle-Damgard Hash Functions[J];Hidenori,2018
4. Encrypted speech perceptual hashing authentication algorithm based on improved 2D-Henon encryption and harmonic product spectrum