共 50 条
- [21] The Evaluation of the Cryptographic Strength of Asymmetric Encryption Algorithms [J]. 2017 SECOND RUSSIA AND PACIFIC CONFERENCE ON COMPUTER TECHNOLOGY AND APPLICATIONS (RPC 2017), 2017, : 180 - 183
- [22] Security Analysis of Cryptographic Algorithms: Hints from Machine Learning [J]. ENGINEERING APPLICATIONS OF NEURAL NETWORKS, EANN 2024, 2024, 2141 : 569 - 580
- [24] Comprehensive analysis on lightweight cryptographic algorithms for low resource devices [J]. Test Engineering and Management, 2019, 81 (11-12): : 3747 - 3760
- [25] Security Evaluation Over Lightweight Cryptographic Protocols [J]. 2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2014, : 171 - 175
- [26] Research and Security Evaluation of AUTH-VRF Model for NCS Network Based on Domestic Cryptographic Algorithms [J]. Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2020, 42 (08): : 1846 - 1852
- [28] Methodology of Testing the Security of Cryptographic Protocols Using the CMMTree Framework [J]. APPLIED SCIENCES-BASEL, 2023, 13 (23):
- [29] An extended analytical framework for heterogeneous implementations of light cryptographic algorithms [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2023, 141 : 154 - 172
- [30] Information Security using Visual Cryptographic Technique for Resource Constrained Devices [J]. 2017 CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (CICT), 2017,