Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
22
views
0
references
Top references
cited by
15
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,457
similar
All similar
Record
: found
Abstract
: not found
Book
: not found
Chai-tea, cryptographic hardware implementations of xtea
Author(s):
J.-P. Kaps
,
Kaps
Publication date:
2008
Read this book at
Bookmark
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
ScienceOpen Research
Data availability:
Comments
Comment on this book
Sign in to comment
Similar content
3,457
Chai Hujian Decoction in the Treatment of Functional Abdominal Pain in 36 Cases
Authors:
Y Chen
40 cases using Xiao Chai Hu Tang and Liu Wei Di Huang Tang in the treatment of recurrent UTIs
Authors:
Zhou
An integrated approach to evaluate the Aji-Chai potash resources in Iran using potential field data
Authors:
Maysam Abedi
See all similar
Cited by
15
High throughput and low area architectures of secure IoT algorithm for medical image encryption
Authors:
Zeesha Mishra
,
Bibhudendra Acharya
Data Flow Modeling and Transformation
Authors:
Patrick Schaumont
Analysis of Control Flow and Data Flow
Authors:
Patrick Schaumont
See all cited by