[图书][B] The design of Rijndael

J Daemen, V Rijmen - 2002 - Springer
Joan Daemen Vincent Rijmen The Advanced Encryption Standard (AES) Second Edition
Page 1 Information Security and Cryptography Joan Daemen Vincent Rijmen The Design of …

Wireless covert communications aided by distributed cooperative jamming over slow fading channels

TX Zheng, Z Yang, C Wang, Z Li… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
In this paper, we study covert communications between a pair of legitimate transmitter-
receiver against a watchful warden over slow fading channels. There coexist multiple …

[图书][B] Foundations of cryptography: volume 2, basic applications

O Goldreich - 2001 - books.google.com
Cryptography is concerned with the conceptualization, definition, and construction of
computing systems that address security concerns. The design of cryptographic systems …

[图书][B] Introduction to modern cryptography: principles and protocols

J Katz, Y Lindell - 2007 - taylorfrancis.com
Cryptography plays a key role in ensuring the privacy and integrity of data and the security of
computer networks. Introduction to Modern Cryptography provides a rigorous yet accessible …

Adaptive synchronization of reaction–diffusion neural networks and its application to secure communication

L Shanmugam, P Mani, R Rajan… - Ieee transactions on …, 2018 - ieeexplore.ieee.org
This paper is mainly concerned with the synchronization problem of reaction-diffusion neural
networks (RDNNs) with delays and its direct application in image secure communications …

[图书][B] A statistical test suite for random and pseudorandom number generators for cryptographic applications

A Rukhin, J Soto, J Nechvatal, M Smid, E Barker… - 2001 - repository.root-me.org
The Information Technology Laboratory (ITL) at the National Institute of Standards and
Technology (NIST) promotes the US economy and public welfare by providing technical …

[图书][B] Mathematics of public key cryptography

SD Galbraith - 2012 - books.google.com
Public key cryptography is a major interdisciplinary subject with many real-world
applications, such as digital signatures. A strong background in the mathematics underlying …

Voltjockey: Breaching trustzone by software-controlled voltage manipulation over multi-core frequencies

P Qiu, D Wang, Y Lyu, G Qu - Proceedings of the 2019 ACM SIGSAC …, 2019 - dl.acm.org
ARM TrustZone builds a trusted execution environment based on the concept of hardware
separation. It has been quite successful in defending against various software attacks and …

A survey of microarchitectural side-channel vulnerabilities, attacks, and defenses in cryptography

X Lou, T Zhang, J Jiang, Y Zhang - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Side-channel attacks have become a severe threat to the confidentiality of computer
applications and systems. One popular type of such attacks is the microarchitectural attack …

Elliptic curve cryptography

D Hankerson, A Menezes - Encyclopedia of Cryptography, Security and …, 2021 - Springer
Background Elliptic curve cryptographic schemes were proposed independently in 1985 by
Neal Koblitz (Koblitz 1987) and Victor Miller (Miller 1986). They are the elliptic curve …