共 50 条
- [32] Data security techniques in cloud computing based on machine learning algorithms and cryptographic algorithms: Lightweight algorithms and genetics algorithms CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (21):
- [33] Use-case Based Early Performance Simulation of Cryptographic Coprocessor 2013 INTERNATIONAL SOC DESIGN CONFERENCE (ISOCC), 2013, : 56 - 59
- [34] FPGA implementation of expandable RSA pubic-key cryptographic coprocessor 2006 1ST INTERNATIONAL SYMPOSIUM ON PERVASIVE COMPUTING AND APPLICATIONS, PROCEEDINGS, 2006, : 552 - +
- [35] Rapid prototype of a fast data encryption standard with integrity processing for cryptographic applications ISCAS '98 - PROCEEDINGS OF THE 1998 INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-6, 1998, : E434 - E437
- [39] On Physical Obfuscation of Cryptographic Algorithms PROGRESS IN CRYPTOLOGY - INDOCRYPT 2009, PROCEEDINGS, 2009, 5922 : 88 - 103
- [40] Principles and performance of cryptographic algorithms DR DOBBS JOURNAL, 1998, 23 (12): : 126 - 131