VLSI Architecture of a Cellular Automata based One-Way Function
暂无分享,去创建一个
[1] Yacov Yacobi,et al. On Key Distribution Systems , 1989, CRYPTO.
[2] Günther Horn,et al. Authentication protocols for mobile network environment value-added services , 2002, IEEE Trans. Veh. Technol..
[3] Markus Jakobsson,et al. Mutual Authentication for Low-Power Mobile Devices , 2002, Financial Cryptography.
[4] Michael A. Nielsen. AN INTRODUCTION TO EXPANDER GRAPHS , 2005 .
[5] Colin Boyd,et al. Protocols for Authentication and Key Establishment , 2003, Information Security and Cryptography.
[6] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[7] M. Murty. Ramanujan Graphs , 1965 .
[8] Duncan S. Wong,et al. Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices , 2001, ASIACRYPT.
[9] Chang-Seop Park. On certificate-based security protocols for wireless mobile communication systems , 1997 .
[10] Guido Bertoni,et al. Efficient GF(pm) Arithmetic Architectures for Cryptographic Applications , 2003, CT-RSA.
[11] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[12] N. Linial,et al. Expander Graphs and their Applications , 2006 .