共 25 条
[1]
Abdlrudha H. H., 2011, 2011 6th International Conference for Internet Technology and Secured Transactions (ICITST), P220
[4]
Chen DM, 2008, PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, P2792, DOI 10.1109/ICYCS.2008.519
[6]
Daemen Joan, 2020, Information Security and Cryptography, V2nd
[7]
Faraoun K, 2010, INT ARAB J INF TECHN, V7, P231
[8]
Jui-Cheng Yen, 1999, 1999 IEEE Workshop on Signal Processing Systems. SiPS 99. Design and Implementation (Cat. No.99TH8461), P430, DOI 10.1109/SIPS.1999.822348
[9]
Khade PN., 2012, IJCSI Int J Comput Sci Iss, V9, P323
[10]
Kocarev L., IEEECIRCUITS SYSTEMS, V1, P6