共 28 条
[1]
Aguilar C(2018)Efficient encryption from random quasi-cyclic codes IEEE Trans. Inf. Theory 64 3927-3943
[2]
Blazy O(1969)On the minimum computation time of functions Trans. Am. Math. Soc. 142 291-314
[3]
Deneuville JC(2016)Structural cryptanalysis of McEliece schemes with compact keys Des. Codes Cryptogr. 79 87-112
[4]
Gaborit P(1962)Low-density parity-check codes IRE Trans. Inf. Theory 8 21-28
[5]
Zémor G(2013)A j-lanes tree hashing mode and j-lanes SHA-256 J. Inf. Secur. 4 7-553
[6]
Cook SA(2014)Parallelized hashing via j-lanes and j-pointers tree modes, with applications to SHA-256 J. Inf. Secur. 5 91-139
[7]
Aanderaa SO(2010)Efficient implementation of the Galois Counter Mode using a carry-less multiplier and a fast reduction algorithm Inf. Process. Lett. 110 549-44:27
[8]
Faugère JC(2012)Simultaneous hashing of multiple messages J. Inf. Secur. 3 319-116
[9]
Otmani A(1997)A look at the rule of three Am. Stat. 51 137-716
[10]
Perret L(1963)Multiplication of multidigit numbers on automata Sov. Phys. Dokl. 7 595-undefined