共 50 条
- [32] The sponge construction as a source of secure cryptographic primitives 2013 MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS CONFERENCE (MCC), 2013,
- [33] Safe and Secure? On the Timing Analysability of Cryptographic Implementations 2024 IEEE 30TH REAL-TIME AND EMBEDDED TECHNOLOGY AND APPLICATIONS SYMPOSIUM, RTAS 2024, 2023, : 68 - 80
- [34] Secure Storage System Using Cryptographic Techniques 2022 FIFTH INTERNATIONAL CONFERENCE OF WOMEN IN DATA SCIENCE AT PRINCE SULTAN UNIVERSITY (WIDS-PSU 2022), 2022, : 138 - 142
- [35] Design Optimization and Automation for Secure Cryptographic Circuits 22ND INTERNATIONAL CONFERENCE ON VLSI DESIGN HELD JOINTLY WITH 8TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS, PROCEEDINGS, 2009, : 321 - +
- [37] Cryptographic component identification: Enabler for secure vehicles VTC2005-FALL: 2005 IEEE 62ND VEHICULAR TECHNOLOGY CONFERENCE, 1-4, PROCEEDINGS, 2005, : 1227 - 1231
- [38] Secure Management of Biomedical Data With Cryptographic Hardware IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE, 2012, 16 (01): : 166 - 175
- [39] Lightweight and Secure Cryptographic Implementations for the Internet of Things INFORMATION SECURITY THEORY AND PRACTICE: SECURING THE INTERNET OF THINGS, 2014, 8501 : XIII - XIV