共 50 条
- [31] Secure Disk with Authenticated Encryption and IV Verification FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 41 - 44
- [32] Authenticated encryption scheme with (t,n) shared verification and its security Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2001, 38 (09):
- [33] SLAE6: Secure and Lightweight Authenticated Encryption Scheme for 6LoWPAN Networks PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON SENSOR NETWORKS, SENSORNETS 2023, 2023, : 67 - 78
- [34] Self-certified proxy convertible authenticated encryption: formal definitions and a provably secure scheme CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2014, 26 (05): : 1038 - 1051
- [35] An authenticated secure image hiding scheme IMAGING SCIENCE JOURNAL, 2009, 57 (02): : 109 - 117
- [37] An Efficient Authenticated Encryption Scheme Based on ECC and its Application for Electronic Payment INFORMATION TECHNOLOGY AND CONTROL, 2013, 42 (04): : 315 - 324
- [38] Security of authenticated encryption scheme with message linkages 2006 INTERNATIONAL CONFERENCE ON HYBRID INFORMATION TECHNOLOGY, VOL 1, PROCEEDINGS, 2006, : 496 - +
- [39] Is RCB a Leakage Resilient Authenticated Encryption Scheme? SECURE IT SYSTEMS, NORDSEC 2017, 2017, 10674 : 39 - 52
- [40] QCB: Efficient Quantum-Secure Authenticated Encryption ADVANCES IN CRYPTOLOGY - ASIACRYPT 2021, PT I, 2021, 13090 : 668 - 698