共 50 条
- [22] An efficient convertible authenticated encryption-scheme and its variant INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 382 - 392
- [24] (t,n) threshold shared verification signature scheme based on discrete logarithms Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2000, 37 (03): : 319 - 323
- [25] On the security of two authenticated encryption schemes PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 1315 - 1319
- [28] KEY MANAGEMENT SCHEME FOR END-TO-END ENCRYPTION AND A FORMAL VERIFICATION OF ITS SECURITY. Systems, computers, controls, 1982, 13 (03): : 59 - 69
- [30] Secure Disk with Authenticated Encryption and IV Verification FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 41 - 44