共 50 条
- [21] Compliance defects in public-key cryptography [J]. PROCEEDINGS OF THE SIXTH ANNUAL USENIX SECURITY SYMPOSIUM: FOCUSING ON APPLICATIONS OF CRYPTOGRAPHY, 1996, : 171 - 178
- [22] On the Performance of GPU Public-Key Cryptography [J]. ASAP 2011 - 22ND IEEE INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES AND PROCESSORS (ASAP 2011), 2011, : 133 - 140
- [24] Public-key cryptography in sensor networks [J]. IASTED INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND EMERGING TECHNOLOGIES, 2005, : 120 - 125
- [25] Reconfigurable processor for public-key cryptography [J]. 2005 IEEE WORKSHOP ON SIGNAL PROCESSING SYSTEMS - DESIGN AND IMPLEMENTATION (SIPS), 2005, : 110 - 115
- [26] Public-key cryptography on the top of a needle [J]. 2007 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-11, 2007, : 1831 - 1834
- [28] Public-key cryptography and invariant theory [J]. Journal of Mathematical Sciences, 2005, 126 (3) : 1152 - 1157
- [29] Public-key cryptography on smart cards [J]. CRYPTOGRAPHY: POLICY AND ALGORITHMS, 1996, 1029 : 250 - 269
- [30] Hierarchical key assignment without public-key cryptography [J]. COMPUTERS & SECURITY, 2001, 20 (07) : 612 - 619