共 50 条
- [22] Compliance defects in public-key cryptography PROCEEDINGS OF THE SIXTH ANNUAL USENIX SECURITY SYMPOSIUM: FOCUSING ON APPLICATIONS OF CRYPTOGRAPHY, 1996, : 171 - 178
- [23] Teaching Public-Key Cryptography in School TEACHING FUNDAMENTAL CONCEPTS OF INFORMATICS, PROCEEDINGS, 2010, 5941 : 112 - 123
- [24] Public-key cryptography on the top of a needle 2007 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-11, 2007, : 1831 - 1834
- [25] On the Performance of GPU Public-Key Cryptography ASAP 2011 - 22ND IEEE INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES AND PROCESSORS (ASAP 2011), 2011, : 133 - 140
- [27] Public-key cryptography in sensor networks IASTED INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND EMERGING TECHNOLOGIES, 2005, : 120 - 125
- [28] Reconfigurable processor for public-key cryptography 2005 IEEE WORKSHOP ON SIGNAL PROCESSING SYSTEMS - DESIGN AND IMPLEMENTATION (SIPS), 2005, : 110 - 115