共 50 条
- [22] Security notes on generalization of threshold signature and authenticated encryption [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (12): : 3443 - 3446
- [23] Authenticated encryption mode for beyond the birthday bound security [J]. PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2008, 2008, 5023 : 125 - +
- [24] Post-Quantum Security Models for Authenticated Encryption [J]. POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2016, 2016, 9606 : 64 - 78
- [26] Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT I, 2016, 9665 : 263 - 293
- [27] Nonce-Misuse Security of the SAEF Authenticated Encryption Mode [J]. SELECTED AREAS IN CRYPTOGRAPHY, 2021, 12804 : 512 - 534
- [28] A Security Framework for NoC Using Authenticated Encryption and Session Keys [J]. Circuits, Systems, and Signal Processing, 2013, 32 : 2605 - 2622
- [29] Compression with Authenticated Encryption for Enhanced Security on Data Centric Products [J]. PROCEEDINGS OF THE 2019 IEEE REGION 10 CONFERENCE (TENCON 2019): TECHNOLOGY, KNOWLEDGE, AND SOCIETY, 2019, : 1596 - 1600
- [30] An Area-Optimized Serial Implementation of ICEPOLE Authenticated Encryption Schemes [J]. PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2016, : 49 - 54