Cited By
View all- Jolfaei AWu XMuthukkumarasamy V(2016)On the Security of Permutation-Only Image Encryption SchemesIEEE Transactions on Information Forensics and Security10.1109/TIFS.2015.248917811:2(235-246)Online publication date: 1-Feb-2016
- Castrillon JThiele LSchorr LSheng WJuurlink BAlvarez-Mesa MPohl AJessenberger RReyes VLeupers RNebel WAtienza D(2015)Multi/many-core programmingProceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition10.5555/2755753.2757208(1708-1717)Online publication date: 9-Mar-2015
- Anderson AMalik AGregg D(2015)Automatic Vectorization of Interleaved Data RevisitedACM Transactions on Architecture and Code Optimization10.1145/283873512:4(1-25)Online publication date: 8-Dec-2015
- Show More Cited By