共 33 条
[1]
[Anonymous], 2010, 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST 2010), P100, DOI 10.1109/HST.2010.5513105
[2]
Back T., 1996, EVOLUTIONARY ALGORIT
[4]
Bertoni G., THE KECCAK REFERENCE
[5]
Bertoni G., 2016, CAESAR SUBMISSION KE
[6]
Bishop C. M., 2006, PATTERN RECOGN
[7]
Boneh D., 1999, NOTICES AM MATH SOC, V46, P203
[8]
Che WJ, 2015, ICCAD-IEEE ACM INT, P337, DOI 10.1109/ICCAD.2015.7372589
[9]
Chen Q., 2009, 2009 12th International Symposium on Integrated Circuits (ISIC 2009), P121
[10]
Daemen J., 2013, DESIGN RIJNDAEL AES