搜索筛选:
搜索耗时0.0872秒,为你在为你在102,285,761篇论文里面共找到 3 篇相符的论文内容
发布年度:
Research and design of dedicated instruction for reconfigurable matrix multiplication of VLIW proces
[会议论文] 作者:SU Yang,WEI Yuechuan,
来源:第九届中国可信计算与信息安全学术会议 年份:2015
...
Research and design of dedicated instruction for reconfigurable matrix multiplication of VLIW proces
[会议论文] 作者:SU Yang,WEI Yuechuan,
来源:第九届中国可信计算与信息安全学术会议 年份:2015
The design and security analysis of symmetric cipher algorithm is closely related.In order to resist cryptosystem attack effectively, cipher algorithm mainly uses multiplication and iteration of eleme...
[期刊论文] 作者:ZHU Shuaishuai,HAN Yiliang,YANG Xiaoyuan,WEI Yuechuan,
来源:中国通信(英文版) 年份:2016
The trustworthiness of virtual machines is a big security issue in cloud computing.In this paper,we aimed at designing a practical trustworthiness mechanism in...
相关搜索: