From post

Hardware Performance Optimization and Evaluation of SM3 Hash Algorithm on FPGA.

, , , , , и . ICICS, том 7618 из Lecture Notes in Computer Science, стр. 105-118. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Chord: Thwarting Relay Attacks Among Near Field Communications., , , , , и . Inscrypt, том 11449 из Lecture Notes in Computer Science, стр. 329-348. Springer, (2018)NFPS: Adding Undetectable Secure Deletion to Flash Translation Layer., , , и . AsiaCCS, стр. 305-315. ACM, (2016)A Tiny RSA Coprocessor based on Optimized Systolic Montgomery Architecture., , , и . SECRYPT, стр. 105-113. SciTePress, (2011)Evaluating the Optimized Implementations of SNOW3G and ZUC on FPGA., , , , и . TrustCom, стр. 436-442. IEEE Computer Society, (2012)Chameleon: A Lightweight Method for Thwarting Relay Attacks in Near Field Communication., , , , , и . ICICS, том 9543 из Lecture Notes in Computer Science, стр. 346-355. Springer, (2015)Hardware Performance Optimization and Evaluation of SM3 Hash Algorithm on FPGA., , , , , и . ICICS, том 7618 из Lecture Notes in Computer Science, стр. 105-118. Springer, (2012)MDEFTL: Incorporating Multi-Snapshot Plausible Deniability into Flash Translation Layer., , , , и . IEEE Trans. Dependable Secur. Comput., 19 (5): 3494-3507 (2022)eHIFS: An Efficient History Independent File System., , , и . AsiaCCS, стр. 573-585. ACM, (2019)Physical-Layer Identification of HF RFID Cards Based on RF Fingerprinting., , , и . ISPEC, том 10060 из Lecture Notes in Computer Science, стр. 284-299. (2016)An Administrative Model for Role-Based Access Control Using Hierarchical Namespace., и . PACIS, стр. 30. AISeL, (2006)