Cited By
View all- Roman RAlcaraz CLopez J(2018)A survey of cryptographic primitives and implementations for hardware-constrained sensor network nodesMobile Networks and Applications10.1007/s11036-007-0024-212:4(231-244)Online publication date: 26-Dec-2018
- Shim K(2017)BASISIEEE Transactions on Information Forensics and Security10.1109/TIFS.2017.266806212:7(1545-1554)Online publication date: 1-Jul-2017
- Hülsing ARijneveld JSchwabe P(2016)ARMed SPHINCSProceedings, Part I, of the 19th IACR International Conference on Public-Key Cryptography --- PKC 2016 - Volume 961410.1007/978-3-662-49384-7_17(446-470)Online publication date: 6-Mar-2016
- Show More Cited By