共 50 条
[31]
An Area-Optimized Serial Implementation of ICEPOLE Authenticated Encryption Schemes
[J].
PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST),
2016,
:49-54
[32]
McOE: A Family of Almost Foolproof On-Line Authenticated Encryption Schemes
[J].
FAST SOFTWARE ENCRYPTION (FSE 2012),
2012, 7549
:196-215
[35]
Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes
[J].
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT I,
2016, 10031
:369-395
[37]
Security of Two Recent Constant-Round Password Authenticated Group Key Exchange Schemes
[J].
2009 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS: WAINA, VOLS 1 AND 2,
2009,
:134-139
[40]
Security weaknesses of certain broadcast encryption schemes
[J].
DIGITAL RIGHTS MANAGEMENT: TECHNOLOGIES, ISSUES, CHALLENGES AND SYSTEMS,
2006, 3919
:228-245