A Data Specific Comparative Study for Choosing Best Cryptographic Technique
Xie, H., Zhou, L., & Bhuyan, L. (2002, February). Architectural analysis of cryptographic applications for network processors. In Proceedings of the IEEE First Workshop on Network Processors with HPCA-8.
Schneier, B., & Whiting, D. (2000, April). A Performance Comparison of the Five AES Finalists. In AES Candidate Conference (pp. 123-135).
Elbaz, L., & Bar-EI, H. (2000). Strength Assessment of Encryption Algorithm (white paper). CA, US: Discretix Technologies Ltd.
Meyer, C. H. (1989, May). Cryptography-A state of the art review. In CompEuro'89.,'VLSI and Computer Peripherals. VLSI and Microelectronic Applications in Intelligent Peripherals and their Interconnection Networks', Proceedings.(pp. 4-150). IEEE.
Standard, D. E. (1978). Federal Information Processing Standard (FIPS), Publication 46, National Bureau of Standards, US Department of Commerce, Washington DC, January 1977. Google Scholar.
Abid, A., Hussain, N., Abid, K., Ahmad, F., Farooq, M. S., Farooq, U., ... & Sabir, N. (2016). A survey on search results diversification techniques. Neural Computing and Applications, 27(5), 1207-1229
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.