共 50 条
[31]
Secure Disk with Authenticated Encryption and IV Verification
[J].
FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS,
2009,
:41-44
[32]
A Pairing-Based Three-Party Authenticated Encryption Scheme without Shared Secrets
[J].
SYMMETRY-BASEL,
2019, 11 (05)
[33]
On the security of two improved authenticated encryption schemes
[J].
Int. J. Secur. Netw.,
2013, 4 (194-199)
:194-199
[36]
Authenticated encryption and steganography in unconditional security setting
[J].
2005 IEEE INFORMATION THEORY WORKSHOP ON THEORY AND PRACTICE IN INFORMATION-THEORETIC SECURITY,
2005,
:1-6
[37]
An Efficient Authenticated Encryption Scheme Based on ECC and its Application for Electronic Payment
[J].
INFORMATION TECHNOLOGY AND CONTROL,
2013, 42 (04)
:315-324
[38]
Security Analysis of Two Authenticated Encryption Schemes
[J].
2008 INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS SYMPOSIA, PROCEEDINGS,
2008,
:158-163
[39]
Authenticated encryption scheme based on quadratic residue
[J].
ELECTRONICS LETTERS,
1998, 34 (22)
:2115-2116
[40]
Is RCB a Leakage Resilient Authenticated Encryption Scheme?
[J].
SECURE IT SYSTEMS, NORDSEC 2017,
2017, 10674
:39-52