共 50 条
[42]
Beyond Conventional Security in Sponge-Based Authenticated Encryption Modes
[J].
Journal of Cryptology,
2019, 32
:895-940
[43]
KDM-CCA Security from RKA Secure Authenticated Encryption
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT I,
2015, 9056
:559-583
[44]
INT-RUP Security of Checksum-Based Authenticated Encryption
[J].
PROVABLE SECURITY, PROVSEC 2017,
2017, 10592
:147-166
[45]
Efficient convertible authenticated encryption schemes for smart card applications in network environments
[J].
WMSCI 2005: 9TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL 5,
2005,
:13-18
[47]
FPGA implementation and comparison of AES-GCM and Deoxys Authenticated Encryption schemes
[J].
2017 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS),
2017,
:356-359
[48]
Breaking the IOC Authenticated Encryption Mode
[J].
PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2014,
2014, 8469
:126-135
[49]
Indifferentiable Authenticated Encryption
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT I,
2018, 10991
:187-220
[50]
The Emergence of Authenticated Encryption
[J].
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2014,
2014, 8479