共 50 条
- [22] Logic for verifying public-key cryptographic protocols [J]. IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1997, 144 (01): : 28 - 32
- [23] SYMMETRIC KEY CRYPTOGRAPHIC ALGORITHM BASED ON LOGARITHMIC FUNCTION [J]. 2015 FIFTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT2015), 2015, : 757 - 762
- [24] Classical and Physical Security of Symmetric Key Cryptographic Algorithms [J]. PROCEEDINGS OF THE 2021 IFIP/IEEE INTERNATIONAL CONFERENCE ON VERY LARGE SCALE INTEGRATION (VLSI-SOC), 2021, : 186 - 187
- [25] Efficient key management methods for symmetric cryptographic algorithm [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (IEEE ICCIC 2018), 2018, : 377 - 380
- [27] On the round security of symmetric-key cryptographic primitives [J]. ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 376 - 393
- [28] An Approach to Cryptographic Key Exchange Using Fingerprint [J]. SECURITY IN COMPUTING AND COMMUNICATIONS, 2014, 467 : 162 - 172
- [29] A New Hybrid Asymmetric Key-Exchange and Visual Cryptographic Algorithm tor Securing Digital Images [J]. 2013 5TH INTERNATIONAL CONFERENCE ON ADAPTIVE SCIENCE AND TECHNOLOGY (ICAST 2013), 2013,