共 50 条
- [1] Asynchronous cryptographic hardware design 2006: 40th Annual IEEE International Carnahan Conferences Security Technology, Proceedings, 2006, : 221 - 227
- [2] Hardware Design of Cryptographic Accelerator 2018 IEEE 16TH WORLD SYMPOSIUM ON APPLIED MACHINE INTELLIGENCE AND INFORMATICS (SAMI 2018): DEDICATED TO THE MEMORY OF PIONEER OF ROBOTICS ANTAL (TONY) K. BEJCZY, 2018, : 201 - 206
- [3] Efficient Hardware Architecture of SHA-256 Algorithm for Trusted Mobile Computing INFORMATION SECURITY AND CRYPTOLOGY, 2009, 5487 : 240 - +
- [4] The design of a cryptographic security architecture USENIX ASSOCIATION PROCEEDINGS OF THE EIGHTH USENIX SECURITY SYMPOSIUM (SECURITY '99), 1999, : 153 - 168
- [5] Cellular automata architecture for elliptic curve cryptographic hardware COMPUTATIONAL SCIENCE - ICCS 2006, PT 3, PROCEEDINGS, 2006, 3993 : 329 - 336
- [6] A design of hardware cryptographic co-processor IEEE SYSTEMS, MAN AND CYBERNETICS SOCIETY INFORMATION ASSURANCE WORKSHOP, 2003, : 234 - 236
- [7] Design of cellular automata hardware for cryptographic applications 2004 International Semiconductor Conference, Vols 1and 2, Proceedings, 2004, : 463 - 466
- [8] KEY MANAGEMENT PROCESS ON THE HARDWARE CRYPTOGRAPHIC MODULE IN THE CLOUD COMPUTING KEOD 2010: Proceedings of the International Conference on Knowledge Engineering and Ontology Development, 2010, : 493 - 496
- [10] Power efficient hardware architecture of SHA-1 algorithm for Trusted mobile computing INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2007, 4681 : 375 - +