共 50 条
[22]
An efficient convertible authenticated encryption-scheme and its variant
[J].
INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS,
2003, 2836
:382-392
[23]
An Efficient and Lightweight Deniably Authenticated Encryption Scheme for e-Mail Security
[J].
IEEE ACCESS,
2019, 7
:184207-184220
[24]
(t,n) threshold shared verification signature scheme based on discrete logarithms
[J].
Jisuanji Yanjiu yu Fazhan/Computer Research and Development,
2000, 37 (03)
:319-323
[25]
On the security of two authenticated encryption schemes
[J].
PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2,
2008,
:1315-1319
[29]
KEY MANAGEMENT SCHEME FOR END-TO-END ENCRYPTION AND A FORMAL VERIFICATION OF ITS SECURITY.
[J].
Systems, computers, controls,
1982, 13 (03)
:59-69