共 50 条
- [33] A Topologically Simple Keyed Hash Function Based on Circular Chaotic Sinusoidal Map Network 2013 15TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2013, : 1089 - 1094
- [37] VLSI implementation of the keyed-hash message authentication code for the wireless application protocol ICECS 2003: PROCEEDINGS OF THE 2003 10TH IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, CIRCUITS AND SYSTEMS, VOLS 1-3, 2003, : 24 - 27
- [38] An Efficient Fault-Tolerance Technique for the Keyed-Hash Message Authentication Code 2010 IEEE AEROSPACE CONFERENCE PROCEEDINGS, 2010,
- [39] Efficient small-sized implementation of the keyed-hash message authentication code EUROCON 2005: THE INTERNATIONAL CONFERENCE ON COMPUTER AS A TOOL, VOL 1 AND 2 , PROCEEDINGS, 2005, : 1875 - 1878