1 |
Large-Scale Invisible Attack on AFC Systems with NFC-Equipped Smartphones
|
会议论文 |
Fan Dang;Pengfei Zhou;Zhenhua Li;Ennan Zhai;Aziz Mohaisen;Qingfu Wen;Mo Li |
2 |
Mind the Balance: Revealing the Vulnerabilities in Low Entropy Masking Schemes
|
期刊论文 |
Jingdian Ming;Yongbin Zhou;Wei Cheng;Huizhong Li;Guang Yang;Qian Zhang |
3 |
Post-Quantum Universal Composable OT Based on Key Exchange
|
期刊论文 |
Hangchao Ding;Han Jiang;Qiuliang Xu |
4 |
一种针对AES算法线性部分的高效掩码防护方法
|
专利 |
周永彬;明经典;张倩;李慧中 |
5 |
一种支持双重访问控制的数据共享方法及系统
|
专利 |
周永彬;王提;马晖;张锐 |
6 |
一种实现区块链共识机制的方法
|
专利 |
张锐;肖禹亭 |
7 |
Collusion Resistant Watermarking Schemes for Cryptographic Functionalities
|
会议论文 |
Rupeng Yang;Man Ho Au;Junzuo Lai;Qiuliang Xu;Zuoxia Yu |
8 |
Multi-user Searchable Encryption with a Designated Server
|
期刊论文 |
Zhen Li;Minghao Zhao;Han Jiang;Qiuliang Xu |
9 |
基于沙普利值计算的区块链中Pos共识机制的改进
|
期刊论文 |
刘怡然;柯俊明;蒋瀚;宋祥福 |
10 |
Fast and Light Bandwidth Testing for Internet Users
|
会议论文 |
Xinlei Yang;Xianlong Wang;Zhenhua Li;Yunhao Liu;Feng Qian;Liangyi Gong;Rui Miao;Tianyin Xu |
11 |
Privacy Preserved Wireless Sensor Location Protocols Based on Mobile Edge Computing
|
期刊论文 |
Han Jiang;Hao Wang;Zhihua Zheng;Qiuliang Xu |
12 |
Practical Web-based Delta Synchronization for Cloud Storage Services
|
会议论文 |
He Xiao;Zhenhua Li;Ennan Zhai;Tianyin Xu |
13 |
多源融合信息泄漏检测方法
|
期刊论文 |
曹雨晨;周永彬 |
14 |
Server-Aided Immediate and Robust User Revocation Mechanism for SM9
|
期刊论文 |
Shuzhou Sun;Hui Ma;Rui Zhang;Wenhan Xu |
15 |
基于Web的网速测量方法及装置
|
专利 |
杨昕磊;王显龙;李振华 |
16 |
Cache-Collision Attacks on GPU-Based AES Implementation with Electro-Magnetic Leakages
|
会议论文 |
Yiwen Gao;Wei Cheng;Hailong Zhang;Yongbin Zhou |
17 |
NFC-Enabled Attack on Cyber Physical Systems: A Practical Case Study
|
会议论文 |
Fan Dang;Pengfei Zhou;Zhenhua Li;Yunhao Liu |
18 |
An In-depth Study of Commercial MVNO: Measurement and Optimization
|
会议论文 |
Ao Xiao;Yunhao Liu;Yang Li;Feng Qian;Zhenhua Li;Sen Bai;Yao Liu;Xianlong Xin;Tianyin Xu |
19 |
Experience: Aging or Glitching? Why Does Android Stop Responding and What Can We Do About It?
|
会议论文 |
Mingliang Li;Hao Lin;Cai Liu;Zhenhua Li;Feng Qian;Yunhao Liu;Nian Sun;Tianyin Xu |
20 |
Fully Accountable Data Sharing for Pay-as-You-Go Cloud Scenes
|
期刊论文 |
Ti Wang;Hui Ma;Yongbin Zhou;Rui Zhang;Zishuai Song |
21 |
Server-Aided Fine-Grained Access Control Mechanism with Robust Revocation in Cloud Computing
|
期刊论文 |
Hui Ma;Rui Zhang;Shuzhou Sun;Zishuai Song;Gaosheng Tan |
22 |
一种智能卡中继攻击的检测方法、读写终端及系统
|
专利 |
党凡;李振华;刘云浩 |
23 |
一种可监管的区块链系统及方法
|
专利 |
张锐;肖禹亭;马晖 |
24 |
An Efficient CCA-Secure Access Control Encryption for Any Policy
|
会议论文 |
Gaosheng Tan;Rui Zhang;Hui Ma;Yang Tao |
25 |
An Enhanced Searchable Encryption Scheme for Secure Data Outsourcing
|
期刊论文 |
Rui Zhang;Jiabei Wang;Zishuai Song;Xi Wang |
26 |
面向集合计算的隐私保护统计协议
|
期刊论文 |
宋祥福;盖敏;赵圣楠;蒋瀚 |
27 |
一种后量子密码构造中环上舍入学习的通用软件实现方法
|
专利 |
周永彬;姜子铭;张锐 |
28 |
一种区块链的认证服务装置及节点准入、用户认证方法
|
专利 |
张锐;王加贝;王提 |
29 |
Efficient Multi-Factor Authenticated Key Exchange Scheme for Mobile Communications
|
期刊论文 |
Rui Zhang;Yuting Xiao;Shuzhou Sun;Hui Ma |
30 |
Automating Cloud Deployment for Deep Learning Inference of Real-time Online Services
|
会议论文 |
Yang Li;Zhenhua Han;Quanlu Zhang;Zhenhua Li;Haisheng Tan |
31 |
Electro-Magnetic Analysis of GPU-Based AES Implementation
|
会议论文 |
Yiwen Gao;Hailong Zhang;Wei Cheng;Yongbin Zhou;Yuchen Cao |
32 |
Hashing Multiple Messages with SM3 on GPU Platforms
|
期刊论文 |
Shuzhou Sun;Rui Zhang;Hui Ma |
33 |
A Nationwide Study on Cellular Reliability: Measurement, Analysis, and Enhancements
|
会议论文 |
Yang Li;Hao Lin;Zhenhua Li;Yunhao Liu;Feng Qian;Liangyi Gong;Xianlong Xin;Tianyin Xu |
34 |
Lightweight Threshold Private Set Intersection via Oblivious Transfer
|
会议论文 |
Shengnan Zhao;Ming Ma;Xiangfu Song;Han Jiang;Yunxue Yan;Qiuliang Xu |
35 |
Quantum Protocols for Private Set Intersection Cardinality and Union Cardinality Based on Entanglement Swapping
|
期刊论文 |
Yongli Wang;Peichu Hu;Qiuliang Xu |
36 |
Breaking Real-World COTS USIM Cards with Unknown Side-Channel Countermeasures
|
期刊论文 |
Chengbin Jin;Yongbin Zhou;Xinkuan Qiu;Qi Feng;Qian Zhang |
37 |
Understanding the Ecosystem and Addressing the Fundamental Concerns of Commercial MVNO
|
期刊论文 |
Yang Li;Jianwei Zheng;Zhenhua Li;Yunhao Liu;Feng Qian;Sen Bai;Yao Liu;Xianlong Xin |
38 |
Rényi Divergence on Learning with Errors
|
期刊论文 |
Yang Tao;Han Wang;Rui Zhang |
39 |
Possibility and Impossibility Results for Receiver Selective Opening Secure PKE in the Multi-Challenge Setting
|
会议论文 |
Rupeng Yang;Junzuo Lai;Zhengan Huang;Man Ho Au;Qiuliang Xu;Willy Susilo |
40 |
A Quantitative and Comparative Study of Network-level Efficiency for Cloud Storage Services
|
期刊论文 |
Zhenhua Li;Yongfeng Zhang;Yunhao Liu;Tianyin Xu;Ennan Zhai;Yao Liu;Xiaobo Ma;Zhenyu Li |
41 |
Integer LWE with Non-Subgaussian Error and Related Attacks
|
会议论文 |
Tianyu Wang;Yuejun Liu;Jun Xu;Lei Hu;Yang Tao;Yongbin Zhou |
42 |
An Efficient Strong Designated Verifier Signature Based on R−SIS Assumption
|
期刊论文 |
Jie Cai;Han Jiang;Pingyuan Zhang;Zhihua Zheng;Guangshi Lyu;Qiuliang Xu |
43 |
Pricing Data Tampering in Automated Fare Collection with NFC-equipped Smartphones
|
期刊论文 |
Fan Dang;Ennan Zhai;Zhenhua Li;Pengfei Zhou;Aziz Mohaisen;Kaigui Bian;Qingfu Wen;Mo Li |
44 |
Postquantum Cut-and-Choose Oblivious Transfer Protocol Based on LWE
|
期刊论文 |
Hangchao Ding;Han Jiang;Qiuliang Xu |
45 |
Optimizing Inner Product Masking Scheme by a Coding Theory Approach
|
期刊论文 |
Wei Cheng;Sylvain Guilley;Claude Carlet;Sihem Mesnager;Jean-Luc Danger |
46 |
一种具有密文同态性的身份标识密码系统的用户撤销方法
|
专利 |
张锐;马晖;孙书洲 |
47 |
Unforgeable Watermarking Schemes with Public Extraction
|
会议论文 |
Rupeng Yang;Man Ho Au;Junzuo Lai;Qiuliang Xu;Zuoxia Yu |
48 |
Mahalanobis Distance Similarity Measure Based Higher Order Optimal Distinguisher
|
期刊论文 |
Hailong Zhang;Yongbin Zhou |
49 |
Side-Channel Attacks with Multi-Thread Mixed Leakage
|
期刊论文 |
Yiwen Gao;Yongbin Zhou |
50 |
CDAE: Towards Empowering Denoising in Side-Channel Analysis
|
会议论文 |
Guang Yang;Huizhong Li;Jingdian Ming;Yongbin Zhou |
51 |
Lock-Free Collaboration Support for Cloud Storage Services with Operation Inference and Transformation
|
会议论文 |
Jian Chen;Minghao Zhao;Zhenhua Li;Ennan Zhai;Feng Qian;Hongyi Chen;Yunhao Liu;Tianyin Xu |
52 |
无埋点式云端收集分析浏览器Trace的方法及系统
|
专利 |
刘云浩;杨启凡;李振华 |
53 |
Resisting Tag Spam by Leveraging Implicit User Behaviors
|
期刊论文 |
Ennan Zhai;Zhenhua Li;Zhenyu Li;Fan Wu;Guihai Chen |
54 |
The Notion of Transparency Order, Revisited
|
期刊论文 |
Huizhong Li;Yongbin Zhou;Jingdian Ming;Guang Yang;Chengbin Jin |
55 |
Decentralization is Vulnerable Under the Gap Game
|
期刊论文 |
Yiran Liu;Junming Ke;Qiuliang Xu;Han Jiang;Hao Wang |
56 |
Multi-Channel Fusion Attacks
|
期刊论文 |
Wei Yang;Yongbin Zhou;Yuchen Cao;Hailong Zhang;Qian Zhang;Huan Wang |
57 |
比特币挖矿攻击研究
|
期刊论文 |
韩健;邹静;蒋瀚;徐秋亮 |
58 |
cuNH: Efficient GPU Implementations of Post-Quantum KEM NewHope
|
期刊论文 |
Yiwen Gao;Jia Xu;Hongbing Wang |
59 |
Further Improving Efficiency of Higher Order Masking Schemes by Decreasing Randomness Complexity
|
期刊论文 |
Rui Zhang;Shuang Qiu;Yongbin Zhou |
60 |
The Cask Effect of Multi-source Content Delivery: Measurement and Mitigation
|
会议论文 |
Xi Chen;Minghao Zhao;Xinlei Yang;Zhenhua Li;Yao Liu;Zhenyu Li;Yunhao Liu |
61 |
Template Attack vs. Stochastic Model: An Empirical Study on the Performances of Profiling Attacks in Real Scenarios
|
期刊论文 |
Hailong Zhang;Yongbin Zhou |
62 |
On the Synchronization Bottleneck of OpenStack Swift-Like Cloud Storage Systems
|
期刊论文 |
Mingkang Ruan;Thierry Titcheu;Ennan Zhai;Zhenhua Li;Yao Liu;Jinlong E;Yong Cui;Hong Xu |
63 |
Towards Web-based Delta Synchronization for Cloud Storage Services
|
会议论文 |
He Xiao;Zhenhua Li;Ennan Zhai;Tianyin Xu;Yang Li;Yunhao Liu;Quanlu Zhang;Yao Liu |
64 |
Lattice-Based Universal Accumulator with Nonmembership Arguments
|
会议论文 |
Zuoxia Yu;Man Ho Au;Rupeng Yang;Junzuo Lai;Qiuliang Xu |
65 |
New Empirical Traceability Analysis of CryptoNote-Style Blockchains
|
会议论文 |
Zuoxia Yu;Man Ho Au;Jiangshan Yu;Rupeng Yang;Qiuliang Xu;Wang Fat Lau |
66 |
(Full) Leakage resilience of Fiat-Shamir signatures over lattices
|
期刊论文 |
Yuejun Liu;Yongbin Zhou;Rui Zhang;Yang Tao |
67 |
Understanding and Detecting Overlay-based Android Malware at Market Scales
|
会议论文 |
Yuxuan Yan;Zhenhua Li;Qi Alfred Chen;Christo Wilson;Tianyin Xu;Ennan Zhai;Yong Li;Yunhao Liu |
68 |
Efficient Lattice-Based Zero-Knowledge Arguments with Standard Soundness: Construction and Applications
|
会议论文 |
Rupeng Yang;Man Ho Au;Zhenfei Zhang;Qiuliang Xu;Zuoxia Yu;William Whyte |
69 |
Cut-and-Choose Bilateral Oblivious Transfer Protocol Based on DDH Assumption
|
期刊论文 |
Han Jiang;Qiuliang Xu;Changyuan Liu;Zhihua Zheng;Yi Tang;Mingqiang Wang |
70 |
Searchable Symmetric Encryption with Tunable Leakage Using Multiple Servers
|
会议论文 |
Xiangfu Song;Dong Yin;Han Jiang;Qiuliang Xu |
71 |
Efficient Parallelism of Post-Quantum Signature Scheme SPHINCS
|
期刊论文 |
Shuzhou Sun;Rui Zhang;Hui Ma |
72 |
Efficient Fine-Grained Data Sharing Mechanism for Electronic Medical Record Systems with Mobile Devices
|
期刊论文 |
Hui Ma;Rui Zhang;Guomin Yang;Zishuai Song;Kai He;Yuting Xiao |
73 |
Understanding Offline Password-Cracking Methods: A Large-Scale Empirical Study
|
期刊论文 |
Ruixin Shi;Yongbin Zhou;Yong Li;Weili Han |
74 |
Quantum Secure Multi-Party Summation Based on Entanglement Swapping
|
期刊论文 |
Yongli Wang;Peichu Hu;Qiuliang Xu |
75 |
Detecting Wormhole Attacks in 3D Wireless Ad Hoc Networks via 3D Forbidden Substructures
|
期刊论文 |
Sen Bai;Yunhao Liu;Zhenhua Li;Xin Bai |
76 |
H2Cloud: Maintaining the Whole Filesystem in an Object Storage Cloud
|
会议论文 |
Minghao Zhao;Zhenhua Li;Ennan Zhai;Gareth Tyson;Chen Qian;Zhenyu Li;Leiyu Zhao |
77 |
Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency
|
期刊论文 |
Xiangfu Song;Changyu Dong;Dandan Yuan;Qiuliang Xu;Minghao Zhao |
78 |
A New Post-Quantum Blind Signature From Lattice Assumptions
|
期刊论文 |
Pingyuan Zhang;Han Jiang;Zhihua Zheng;Peichu Hu;Qiuliang Xu |
79 |
Concessive Online/Offline Attribute Based Encryption with Cryptographic Reverse Firewalls—Secure and Efficient Fine-Grained Access Control on Corrupted Machines
|
会议论文 |
Hui Ma;Rui Zhang;Guomin Yang;Zishuai Song;Shuzhou Sun;Yuting Xiao |
80 |
Mobile Gaming on Personal Computers with Direct Android Emulation
|
会议论文 |
Qifan Yang;Zhenhua Li;Yunhao Liu;Hai Long;Yuanchao Huang;Jiaming He;Tianyin Xu;Ennan Zhai |
81 |
Certifying Variant of RSA with Generalized Moduli
|
会议论文 |
Yao Lu;Noboru Kunihiro;Rui Zhang;Liqiang Peng;Hui Ma |
82 |
ID-Based Strong Designated Verifier Signature over R-SIS Assumption
|
期刊论文 |
Jie Cai;Han Jiang;Pingyuan Zhang;Zhihua Zheng;Hao Wang;Guangshi Lü;Qiuliang Xu |
83 |
安全多方计算关键技术:茫然传输协议
|
期刊论文 |
徐秋亮;蒋瀚;赵圣楠 |
84 |
基于云存储的区块链可靠数据存储方法、终端及系统
|
专利 |
张锐;肖禹亭;马晖 |
85 |
Decentralized Blacklistable Anonymous Credentials with Reputation
|
会议论文 |
Rupeng Yang;Man Ho Au;Qiuliang Xu;Zuoxia Yu |
86 |
基于高性能密码实现的大数据安全方案
|
期刊论文 |
杨国强;丁杭超;邹静;蒋瀚;陈彦琴 |
87 |
一种云计算环境下的安全可控高效的数据共享方法及系统
|
专利 |
周永彬;王提;马晖;张锐 |
88 |
Modeling Password Guessability via Variational Auto-Encoder
|
会议论文 |
Jinwei Wang;Yong Li;Xi Chen;Yongbin Zhou |
89 |
Fully Secure ABE with Outsourced Decryption against Chosen Ciphertext Attack
|
会议论文 |
Ti Wang;Yongbin Zhou;Hui Ma;Yuejun Liu;Rui Zhang |
90 |
Statistical Properties of Side-Channel and Fault Injection Attacks Using Coding Theory
|
期刊论文 |
Claude Carlet;Sylvain Guilley |
91 |
Decentralized Blacklistable Anonymous Credentials with Reputation
|
期刊论文 |
Rupeng Yang;Man Ho Au;Qiuliang Xu;Zuoxia Yu |
92 |
A Compact AES Hardware Implementation Secure against 1st-Order Side-Channel Attacks
|
会议论文 |
Qian Zhang;Yongbin Zhou;Shuang Qiu;Wei Cheng;Jingdian Ming;Rui Zhang |
93 |
On the Exact Relationship between the Mutual Information Metric and the Success Rate Metric
|
期刊论文 |
Hailong Zhang;Yongbin Zhou |
94 |
Efficient Electro-Magnetic Analysis of A GPU Bitsliced AES Implementation
|
期刊论文 |
Yiwen Gao;Yongbin Zhou;Wei Cheng |
95 |
Key Dependent Message Security for Revocable Identity-Based Encryption and Identity-Based Encryption
|
会议论文 |
Rui Zhang;Yang Tao |
96 |
APT: Efficient Side-Channel Analysis Framework against Inner Product Masking Scheme
|
会议论文 |
Jingdian Ming;Wei Cheng;Yongbin Zhou;Huizhong Li |
97 |
A Secure and Highly Efficient First-Order Masking Scheme for AES Linear Operations
|
期刊论文 |
Jingdian Ming;Yongbin Zhou;Huizhong Li;Qian Zhang |
98 |
隐私保护机器学习的密码学方法
|
期刊论文 |
蒋瀚;刘怡然;王皓;郑志华;徐秋亮 |
99 |
环上舍入学习和模上舍入学习的通用实现算法与参数选取方法
|
期刊论文 |
姜子铭;周永彬;张锐 |
100 |
Reducing Randomness Complexity of Mask Refreshing Algorithm
|
会议论文 |
Shuang Qiu;Rui Zhang;Yongbin Zhou;Hailong Zhang |
101 |
Verifiable Public-Key Encryption with Keyword Search Secure against Continual Memory Attacks
|
期刊论文 |
Chengyu Hu;Zhen Li;Pengtao Liu;Rupeng Yang;Shanqing Guo;Hailong Zhang |
102 |
On the Security of Lattice-Based Fiat-Shamir Signatures in the Presence of Randomness Leakage
|
期刊论文 |
Yuejun Liu;Yongbin Zhou;Shuo Sun;Tianyu Wang;Rui Zhang;Jingdian Ming |
103 |
Full-Dimension Relative Positioning for RFID-Enabled Self-Checkout Services
|
期刊论文 |
Chunhui Duan;Jiajun Liu;Xuan Ding;Zhenhua Li;Yunhao Liu |
104 |
Multipurpose Public-Key Encryption
|
会议论文 |
Rui Zhang;Kai He |
105 |
FBS-Radar: Uncovering Fake Base Stations at Scale in the Wild
|
会议论文 |
Zhenhua Li;Weiwei Wang;Christo Wilson;Jian Chen;Chen Qian;Taeho Jung;Lan Zhang;Kebin Liu;Xiangyang Li;Yunhao Liu |
106 |
基于差分隐私的多模式隐藏动态对称可搜索加密方案
|
期刊论文 |
赵梓婷;徐银;宋祥福;蒋瀚 |
107 |
一种可同时支持公有链、联盟链及私有链的区块链系统及应用方法
|
专利 |
张锐;肖禹亭 |
108 |
Multiple Leakage Samples Based Higher Order Optimal Distinguisher
|
期刊论文 |
Hailong Zhang;Yongbin Zhou |
109 |
一种DES加解密密钥生成器及密钥生成方法
|
专利 |
张锐;张倩;周永彬;丁天 |
110 |
Systematically Landing Machine Learning onto Market-Scale Mobile Malware Detection
|
期刊论文 |
Liangyi Gong;Hao Lin;Zhenhua Li;Feng Qian;Yang Li;Xiaobo Ma;Yunhao Liu |
111 |
Generalizing Lyubashevsky-Wichs Trapdoor Sampler for NTRU Lattices
|
期刊论文 |
Yang Tao;Yunfeng Ji;Rui Zhang |
112 |
Accessing Google Scholar under Extreme Internet Censorship A Legal Avenue
|
会议论文 |
Zhen Lu;Zhenhua Li;Jian Yang;Tianyin Xu;Ennan Zhai;Yao Liu;Christo Wilson |
113 |
Information Leakages in Code-based Masking: A Unified Quantification Approach
|
期刊论文 |
Wei Cheng;Sylvain Guilley;Claude Carlet;Jean-Luc Danger;Sihem Mesnager |
114 |
基于区块链的用电客户信用管理方法及系统
|
专利 |
衡星辰;董灿;林克全;张锐;王汐;肖禹亭 |
115 |
Predicate Encryption against Master-Key Tampering Attacks
|
期刊论文 |
Yuejun Liu;Rui Zhang;Yongbin Zhou |
116 |
Convolutional Neural Network Based Side-Channel Attacks in Time-Frequency Representations
|
会议论文 |
Guang Yang;Huizhong Li;Jingdian Ming;Yongbin Zhou |
117 |
Collusion Resistant Watermarkable PRFs from Standard Assumptions
|
会议论文 |
Rupeng Yang;Man Ho Au;Zuoxia Yu;Qiuliang Xu |
118 |
Experiences of Landing Machine Learning onto Market-Scale Mobile Malware Detection
|
会议论文 |
Liangyi Gong;Zhenhua Li;Feng Qian;Zifan Zhang;Qi Alfred Chen;Zhiyun Qian;Hao Lin;Yunhao Liu |
119 |
Understanding Fileless Attacks on Linux-based IoT Devices with HoneyCloud
|
会议论文 |
Fan Dang;Zhenhua Li;Yunhao Liu;Ennan Zhai;Qi Alfred Chen;Tianyin Xu;Yan Chen;Jingyu Yang |
120 |
Fine-Grained Access Control System Based on Fully Outsourced Attribute-Based Encryption
|
期刊论文 |
Rui Zhang;Hui Ma;Yao Lu |
121 |
Transparency Order Versus Confusion Coefficient: A Case Study of NIST Lightweight Cryptography S-Boxes
|
期刊论文 |
Huizhong Li;Guang Yang;Jingdian Ming;Yongbin Zhou;Chengbin Jin |
122 |
Revealing the Weakness of Addition Chain Based Masked SBox Implementations
|
期刊论文 |
Jingdian Ming;Huizhong Li;Yongbin Zhou;Wei Cheng;Zehua Qiao |
123 |
Provably Secure Cloud Storage for Mobile Networks with Less Computation and Smaller Overhead
|
期刊论文 |
Rui Zhang;Hui Ma;Yao Lu;Yang Li |
124 |
Multi-Channel Time-Frequency Fusion Attacks
|
期刊论文 |
Yuchen Cao;Yongbin Zhou;Hailong Zhang |
125 |
A Measurement Study of Oculus 360 Degree Video Streaming
|
会议论文 |
Chao Zhou;Zhenhua Li;Yao Liu |
126 |
一种AES算法的快速安全硬件结构
|
专利 |
张锐;张倩;周永彬;邱爽 |