为了提供给您更好的使用体验,请启用此功能。';window.onload=function(){1==navigator.cookieEnabled||(document.body.insertAdjacentHTML("beforeend",ck_html),window.onscroll=function(i){console.log(i),document.body.setAttribute("style","position:fixed")})}
1. Secure Transactions in IoT Network Using PINN-Based Intrusion Detection System and HDPoA Blockchain Protocol NSTL国家科技图书文献中心
Sourav Mishra | Vijay Kumar Chaurasi... - 《Transactions on Emerging Telecommunications Technologies》 - 2025,36(4) - e70116~ - 共19页
2. ECO-CRYSTALS: Efficient Cryptography CRYSTALS on Standard RISC-V ISA NSTL国家科技图书文献中心
Xinyi Ji | Jiankuo Dong... - 《IEEE Transactions on Computers》 - 2025,74(2) - 401~413 - 共13页
3. Pseudorandom bit generation with asymmetric numeral systems NSTL国家科技图书文献中心
Pieprzyk, Josef | Pawlowski, Marcin... - 《International Journal of Information Security》 - 2025,24(2) - 共18页
4. Simple vs. vectorial: exploiting structural symmetry to beat the ZeroSum distinguisher NSTL国家科技图书文献中心
Sahiba Suryawanshi | Shibam Ghosh... - 《Designs,codes and crytography》 - 2025,93(1) - 133~174 - 共42页
5. Automatic Search of Linear Structure: Applications to Keccak and ASCON NSTL国家科技图书文献中心
Huina Li | Guozhen Liu... - 《Information Security and Cryptology: 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected Papers, Part II》 - International Conference on Information Security and Cryptology - 2024, - 172~192 - 共21页
6. Design and Performance Evaluation of a Novel High-Speed Hardware Architecture for Keccak Crypto Coprocessor NSTL国家科技图书文献中心
Mustafa Sanli - 《International Journal of Parallel Programming》 - 2024,52(5/6) - 367~379 - 共13页
7. Simulating SASCA on Keccak: Security Implications for Post-Quantum Cryptographic Schemes NSTL国家科技图书文献中心
Julien Maillard | Thomas Hiscock... - 《21st International Conference on Security and Cryptography》 - International Conference on Security and Cryptography - 2024, - 518~527 - 共10页
8. Optimizing AES-256 with Keccak Permutations: Achieving High Security and Performance with Reduced Rounds NSTL国家科技图书文献中心
Ma. Esther B. Chio | Ariel M. Sison... - 《2024 15th International Conference on Information and Communication Technology Convergence》 - International Conference on Information and Communication Technology Convergence - 2024, - 2131~2136 - 共6页
9. An Enhanced AES256 Key Generation Process with Keccak-F Permutation Method NSTL国家科技图书文献中心
Ma. Esther B. Chio | Ariel M. Sison... - 《2024 5th International Conference on Information Technology and Education Technology》 - International Conference on Information Technology and Education Technology - 2024, - 74~80 - 共7页
10. LOKI Low-Latency Open-Source Kyber-Accelerator IPs NSTL国家科技图书文献中心
Alessandra Dolmeta | Mattia Mirigaldi... - 《Applications in Electronics Pervading Industry, Environment and Society: Conference on Applications in Electronics Pervading Industry, Environment and Society (APPLEPIES 2023), September 2023, Genova, Italy》 - Conference on Applications in Electronics Pervading Industry, Environment and Society - 2024, - 29~35 - 共7页
服务站
成员单位
友情链接