共 22 条
[1]
[Anonymous], FED INF PROC STAND P
[2]
Bogdanov A, 2007, LECT NOTES COMPUT SC, V4727, P450
[3]
Cazorla M., 2013, SURVEY BENCHMARK LIG
[4]
Chae Hoon Lim, 2005, Information Security Applications. 6th International Workshop, WISA 2005. Revised Selected Papers (Lecture Notes in Computer Science Vol. 3786), P243
[5]
Daemen J., 2000, NESSIE PROPSAL UNPUB
[6]
De Cannière C, 2009, LECT NOTES COMPUT SC, V5747, P272
[7]
des Roziers CB, 2011, LECT NOTES COMPUT SC, V6640, P147, DOI 10.1007/978-3-642-20757-0_12
[8]
Eisenbarth Thomas, 2012, Progress in Cryptology - AFRICACRYPT 2012. Proceedings 5th International Conference on Cryptology in Africa, P172, DOI 10.1007/978-3-642-31410-0_11
[9]
Gong Z, 2012, LECT NOTES COMPUT SC, V7055, P1, DOI 10.1007/978-3-642-25286-0_1
[10]
Guo J., 2011, LNCS IN PRESS