Release time:2017-01-10
Journal:IEEE Transactions on Dependable & Secure Compution
Co-author:Zhe Liu, Xinyi Huang, Zhi Hu, Muhammad K Khan, Hwajeong Seo, Lu Zhou.
Document Type:J
Volume:14
Issue:3
Page Number:237-248
Translation or Not:no
Date of Publication:2017-06-01
Pre One:On Graph Algorithms for Degeneracy Test and Recursive Description of Stream Ciphers
Next One:Elliptic curve cryptography with efficiently computable endomorphisms and its hardware implementations for the Internet of Things
Email:7adfe9e3a9575b691fd010d1a38c87f45f8839381e783a41ec5dee62bb3555902bce3c43d7da29dccd4902f3b449810e81b203573fa27f824b17039395f34e3d9059a7291da12c51b59f2ba807bf082f3b135dde04ba2d7381910a2faf4dc2023f1014a303d2bec7660ab2dacfbbf0d155c3d649b51d2cd89aadbca4e562baf3
The Last Update Time:..