共 50 条
- [41] Performance Analysis of Maximum Length LFSR and BBS Method for Cryptographic Application 2014 INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2014,
- [43] GitHub Considered Harmful? Analyzing Open-Source Projects for the Automatic Generation of Cryptographic API Call Sequences 2022 IEEE 22ND INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY, QRS, 2022, : 896 - 906
- [44] Secure Manhattan Distance Computation and Its Application 1600, Science Press (43): : 352 - 365
- [46] CRYPTOGRAPHIC MASTER-KEY-GENERATION SCHEME AND ITS APPLICATION TO PUBLIC KEY DISTRIBUTION IEE PROCEEDINGS-E COMPUTERS AND DIGITAL TECHNIQUES, 1992, 139 (03): : 203 - 206
- [48] MS Excel-Based Application for Implementing the Cryptographic Algorithm Shamir's Secret Sharing 2020 43RD INTERNATIONAL CONVENTION ON INFORMATION, COMMUNICATION AND ELECTRONIC TECHNOLOGY (MIPRO 2020), 2020, : 1611 - 1616
- [50] How to secure network application systems using cryptographic protocols - Electronic voting systems case NEC RESEARCH & DEVELOPMENT, 2002, 43 (03): : 191 - 194