Author of the publication

A Method for Realizing Secure Chip Multi-Algorithm Processing Application.

, , , , and . FSDM, volume 309 of Frontiers in Artificial Intelligence and Applications, page 743-748. IOS Press, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A security mechanism supporting multi-line key agreement and confirmation., , , and . ICAIIS, page 215:1-215:5. ACM, (2021)Research on a Security Chip Power-Down Test Method Based on MP300 Device., , , , , , , , , and 1 other author(s). FSDM, volume 320 of Frontiers in Artificial Intelligence and Applications, page 870-875. IOS Press, (2019)A Method for Realizing Secure Chip Multi-Algorithm Processing Application., , , , and . FSDM, volume 309 of Frontiers in Artificial Intelligence and Applications, page 743-748. IOS Press, (2018)A Master Station and Terminal Data Exchange Method Based on Symmetric and Asymmetric Algorithms., , , , , , , , , and . CECNet, volume 345 of Frontiers in Artificial Intelligence and Applications, page 387-393. IOS Press, (2021)