共 10 条
[1]
[Anonymous], INT WORKSH FAST SOFT
[2]
[Anonymous], 2016, IMPLEMENTERS GUIDE C
[3]
Banik S, 2016, PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), P71, DOI 10.1109/HST.2016.7495559
[5]
Dworkin Morris J., 2007, TECH REP
[6]
George Mason University, 2017, ATHENA AUT TOOLS HAR ATHENA AUT TOOLS HAR
[7]
Kohno T., 2003, The CWC Authenticated Encryption (associated data) Mode
[8]
McGrew DA, 2004, LECT NOTES COMPUT SC, V3348, P343
[9]
Rogaway P., 2003, ACM Transactions on Information and Systems Security, V6, P365, DOI 10.1145/937527.937529
[10]
Suzaki T., 2013, P INT C SEL ARE CRYP, V7707, P339, DOI 10. 1007/978- 3- 642-35999-6