共 50 条
- [31] The sponge construction as a source of secure cryptographic primitives 2013 MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS CONFERENCE (MCC), 2013,
- [32] Efficient Cryptographic Primitives for Private Data Mining 43RD HAWAII INTERNATIONAL CONFERENCE ON SYSTEMS SCIENCES VOLS 1-5 (HICSS 2010), 2010, : 917 - +
- [33] Encoding Cryptographic Primitives in a Calculus with Polyadic Synchronisation Journal of Automated Reasoning, 2011, 46 : 293 - 323
- [34] New class of the FPGA efficient cryptographic primitives 2004 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOL 2, PROCEEDINGS, 2004, : 553 - 556
- [35] Design of cryptographic protocols by means of genetic algorithms techniques SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 316 - +
- [39] Obfuscated Arbitrary Computation using Cryptographic Primitives 2015 10TH INTERNATIONAL DESIGN & TEST SYMPOSIUM (IDT), 2015, : 5 - 8
- [40] ANALYSIS OF SOME CRYPTOGRAPHIC PRIMITIVES ON COMPUTER CLUSTERS PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2008, 2 (02): : 120 - 130