共 47 条
[1]
Boosting Authenticated Encryption Robustness with Minimal Modifications
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT III,
2017, 10403
:3-33
[2]
Authenticated Encryption in the Face of Protocol and Side Channel Leakage
[J].
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT I,
2017, 10624
:693-723
[3]
Bellare M, 2003, LECT NOTES COMPUT SC, V2612, P1
[4]
Bellare M, 2000, LECT NOTES COMPUT SC, V1976, P531
[5]
Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2020, PT I,
2020, 12170
:369-400
[7]
Berti F., 2016, IACR CRYPTOL EPRINT, V2016, P996
[8]
Berti F, 2017, IACR T SYMMETRIC CRY, V2017, P271, DOI 10.13154/tosc.v2017.i3.271-293
[9]
Berti Francesco., 2019, IACR Transactions on Cryptographic Hardware and Embedded Systems, P256, DOI DOI 10.46586/TCHES.V2020.I1.256-320
[10]
SpookChain: Chaining a Sponge-Based AEAD with Beyond-Birthday Security
[J].
SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, SPACE 2019,
2019, 11947
:67-85