共 50 条
- [32] Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers ADVANCES IN CRYPTOLOGY - CRYPTO 2016, PT I, 2016, 9814 : 33 - 63
- [33] Authenticated Encryption in WSN Using eSTREAM Ciphers ADVANCES IN INFORMATION SECURITY AND ASSURANCE, 2009, 5576 : 741 - 749
- [34] Is RCB a Leakage Resilient Authenticated Encryption Scheme? SECURE IT SYSTEMS, NORDSEC 2017, 2017, 10674 : 39 - 52
- [35] AN ENHANCED THRESHOLD AUTHENTICATED ENCRYPTION SCHEME WITH CONVERTIBILITY INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (11): : 6177 - 6185
- [36] The Software Performance of Authenticated-Encryption Modes FAST SOFTWARE ENCRYPTION (FSE 2011), 2011, 6733 : 306 - 327
- [37] On the security of two improved authenticated encryption schemes Int. J. Secur. Netw., 2013, 4 (194-199): : 194 - 199
- [38] Security of authenticated encryption scheme with message linkages 2006 INTERNATIONAL CONFERENCE ON HYBRID INFORMATION TECHNOLOGY, VOL 1, PROCEEDINGS, 2006, : 496 - +
- [39] Protecting FPGA Bitstreams Using Authenticated Encryption 2013 IEEE 11TH INTERNATIONAL NEW CIRCUITS AND SYSTEMS CONFERENCE (NEWCAS), 2013,