搜索结果: 1-4 共查到“军事学 Tree Parity”相关记录4条 . 查询时间(0.109 秒)
Tree Parity Machine Rekeying Architectures
K.4.4.f Security K.6.5.a Authentication B.7.1.b Algorithms implemented in hardware
2009/3/27
The necessity to secure the communication between hardware components in embedded systems
becomes increasingly important with regard to the secrecy of data and particularly its commercial use.
We su...
Authenticated tree parity machine key exchange
Authenticated tree parity machine key exchange
2009/3/27
Authenticated tree parity machine key exchange.
Tree Parity Machine Rekeying Architectures for Embedded Security
Tree Parity Machine Rekeying Architectures Embedded Security pervasive computing
2009/2/19
Tree Parity Machine Rekeying Architectures for Embedded Security.
Lightweight Key Exchange and Stream Cipher based solely on Tree Parity Machines
Lightweight Key Exchange Stream Cipher Tree Parity Machines
2009/2/18
Lightweight Key Exchange and Stream Cipher based solely on Tree Parity Machines.