共 50 条
- [1] On Secure Outsourcing of Cryptographic Computations to Cloud SCC'14: PROCEEDINGS OF THE 2ND INTERNATIONAL WORKSHOP ON SECURITY IN CLOUD COMPUTING, 2014, : 63 - 67
- [2] Efficient and verifiable algorithms for secure outsourcing of cryptographic computations International Journal of Information Security, 2016, 15 : 519 - 537
- [4] How secure are FPGAs in cryptographic applications? FIELD-PROGRAMMABLE LOGIC AND APPLICATIONS, PROCEEDINGS, 2003, 2778 : 91 - 100
- [5] Secure Synthesis of Distributed Cryptographic Applications 2024 IEEE 37TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM, CSF 2024, 2024, : 433 - 448
- [6] A survey on isogeny-based cryptographic protocols WIRELESS NETWORKS, 2025, 31 (03) : 2993 - 3024
- [8] Isogeny-Based Cryptographic Access Control Automatic Control and Computer Sciences, 2020, 54 : 803 - 812
- [10] Improvement and applications of secure outsourcing of scientific computations Journal of Ambient Intelligence and Humanized Computing, 2015, 6 : 763 - 772