共 25 条
[1]
[Anonymous], LNCS
[2]
[Anonymous], 1997, Handbook of Applied Cryptography
[3]
CARTER JL, 1979, J COMPUT SYST SCI, V18, P143, DOI 10.1016/0022-0000(79)90044-8
[6]
Geetha G., 2008, 2008 1st International Conference on Emerging Trends in Engineering and Technology (ICETET), P1250, DOI 10.1109/ICETET.2008.119
[7]
Gligoroski D., 2009, P 1 INT WORKSH SEC C, V22, P1
[9]
Hamalainen P., 2000, Signal Processing X Theories and Applications. Proceedings of EUSIPCO 2000. Tenth European Signal Processing Conference, P2289
[10]
Hu Alan J., 1999, P CAN C EL COMP ENG