共 10 条
[1]
Daemen Joan, 2020, Information Security and Cryptography, V2nd
[2]
Deguang Le, 2010, 2010 2nd International Conference on Computer Engineering and Technology (ICCET), P1, DOI 10.1109/ICCET.2010.5486259
[3]
Government U., 2011, REC BLOCK CIPH MOD O
[4]
Iwai K., 2010, Proceedings 2010 First International Conference on Networking and Computing (ICNC 2010), P209, DOI 10.1109/IC-NC.2010.49
[5]
Implementation and Analysis of AES Encryption on GPU
[J].
2012 IEEE 14TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS & 2012 IEEE 9TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (HPCC-ICESS),
2012,
:843-848
[7]
Mei C., 2010, INT J COMPUT VISION, P1
[8]
National Institute of Standards and Technology, 2001, 138 NCRP, P1
[9]
Nhat-Phuong Tran, 2011, Proceedings of the 2011 IEEE 14th International Conference on Computational Science and Engineering (CSE 2011). 11th International Symposium on Pervasive Systems, Algorithms, Networks (I-SPAN 2011). 10th IEEE International Conference on Ubiquitous Computing and Communications (IUCC 2011), P191, DOI 10.1109/CSE.2011.43
[10]
Nishikawa N., 2011, Proceedings of the 2011 Second International Conference on Networking and Computing (ICNC 2011), P221, DOI 10.1109/ICNC.2011.40