Author:
Sklavos N.,Koufopavlou O.
Cited by
16 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Securing the Cloud through the Implementation of Encryption Algorithms- A Comprehensive Study;2024 3rd International Conference on Applied Artificial Intelligence and Computing (ICAAIC);2024-06-05
2. Implementation of a modified SHA-3 Hash Function on FPGA;2023 4th IEEE Global Conference for Advancement in Technology (GCAT);2023-10-06
3. Design and Security-Mitigation of Custom and Configurable Hardware Cryptosystems;2023 IEEE 16th Dallas Circuits and Systems Conference (DCAS);2023-04-14
4. Physical Layer Protection Against Relay/Replay Attacks for Short-Range Systems;2023 IEEE Wireless Communications and Networking Conference (WCNC);2023-03
5. Comparative Study of Sha-256 Optimization Techniques;2022 IEEE World AI IoT Congress (AIIoT);2022-06-06