共 50 条
- [33] Ensuring e-security using a private-key cryptographic system following recursive positional modulo-2 substitutions [J]. APPLIED COMPUTING, PROCEEDINGS, 2004, 3285 : 324 - 332
- [34] Performance Evaluation of LFSR-Based Spreading Sequences with Negative Auto-correlation Designed by Chaos Theory of Modulo-2 Added Sequences [J]. 2009 EUROPEAN CONFERENCE ON CIRCUIT THEORY AND DESIGN, VOLS 1 AND 2, 2009, : 141 - 144
- [35] ILP-based Modulo Scheduling and Binding for Register Minimization [J]. 2018 28TH INTERNATIONAL CONFERENCE ON FIELD PROGRAMMABLE LOGIC AND APPLICATIONS (FPL), 2018, : 265 - 271
- [37] A new design method to modulo 2n-1 squaring [J]. 2005 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), VOLS 1-6, CONFERENCE PROCEEDINGS, 2005, : 664 - 667
- [39] A Modulo Based LSB Steganography Method [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION, COMMUNICATION AND ENERGY CONSERVATION INCACEC 2009 VOL 1, 2009, : 318 - +
- [40] TaMeD : A tableau method for deduction modulo [J]. AUTOMATED REASONING, PROCEEDINGS, 2004, 3097 : 445 - 459