共 50 条
- [2] Efficient Schemes for Committing Authenticated Encryption ADVANCES IN CRYPTOLOGY - EUROCRYPT 2022, PT II, 2022, 13276 : 845 - 875
- [3] On the security of two authenticated encryption schemes PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 1315 - 1319
- [4] On the security of two improved authenticated encryption schemes Int. J. Secur. Netw., 2013, 4 (194-199):
- [5] Authenticated Encryption Schemes on Java']Java Card 2019 22ND EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD), 2019, : 238 - 245
- [8] Efficient authenticated encryption schemes with public verifiability VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY, 2004, : 3258 - 3261
- [9] Automated Analysis and Synthesis of Authenticated Encryption Schemes CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 84 - 95
- [10] Security Analysis of Two Authenticated Encryption Schemes 2008 INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS SYMPOSIA, PROCEEDINGS, 2008, : 158 - 163