共 50 条
- [41] Security Level versus Energy Consumption in Wireless Protocols for Internet of Things [J]. INFORMATION AND SOFTWARE TECHNOLOGIES, ICIST 2014, 2014, 465 : 419 - 429
- [42] Energy Consumption of Protected Cryptographic Hardware Cores An Experimental Study [J]. CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, COSADE 2023, 2023, 13979 : 195 - 220
- [43] Methodology of Testing the Security of Cryptographic Protocols Using the CMMTree Framework [J]. APPLIED SCIENCES-BASEL, 2023, 13 (23):
- [44] Provable security for cryptographic protocols - Exact analysis and engineering applications [J]. 10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1997, : 45 - 58
- [46] Analysis of security requirements for cryptographic voting protocols (extended abstract) [J]. ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 1451 - 1456
- [48] Enhancing financial transaction security with lightweight cryptographic algorithms [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (2B): : 741 - 751
- [49] Classical and Physical Security of Symmetric Key Cryptographic Algorithms [J]. PROCEEDINGS OF THE 2021 IFIP/IEEE INTERNATIONAL CONFERENCE ON VERY LARGE SCALE INTEGRATION (VLSI-SOC), 2021, : 186 - 187
- [50] Circuits for Security and Secure Circuits: Implementation of cryptographic algorithms [J]. IEEE Solid-State Circuits Magazine, 2023, 15 (01): : 20 - 24