共 41 条
- [1] Aagaard MD, 2013, 2013 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE-ORIENTED SECURITY AND TRUST (HOST), P29, DOI 10.1109/HST.2013.6581561
- [2] [Anonymous], 2012, IACR CRYPTOLOGY EPRI
- [3] [Anonymous], 2009, IISOIEC154082009
- [4] [Anonymous], 2013, CRYPTOLOGY EPRINT AR
- [5] Bogdanov A, 2007, LECT NOTES COMPUT SC, V4727, P450
- [6] Buchanan WJ., 2017, J CYBER SECUR TECHNO, V1, P187, DOI [DOI 10.1080/23742917.2017.1384917, 10.1080/23742917.2017.1384917]
- [7] Ciampolini P, 2008, 2008 15 IEEE INT C E
- [8] Das R., 2015, IDTECHEX MARKET STUD
- [9] De Canniere C., ESTREAM ECRYPT STREA
- [10] A survey of lightweight-cryptography implementations [J]. IEEE DESIGN & TEST OF COMPUTERS, 2007, 24 (06): : 522 - 533