共 50 条
- [21] An Efficient Authenticated Encryption Scheme Based on ECC and its Application for Electronic Payment [J]. INFORMATION TECHNOLOGY AND CONTROL, 2013, 42 (04): : 315 - 324
- [22] An Efficient Authenticated-Encryption with Associated-Data Block Cipher Mode for Wireless Sensor Networks [J]. WIRED-WIRELESS INTERNET COMMUNICATIONS, PROCEEDINGS, 2010, 6074 : 375 - 385
- [23] Efficient Schemes for Committing Authenticated Encryption [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2022, PT II, 2022, 13276 : 845 - 875
- [24] Security of authenticated encryption scheme with message linkages [J]. 2006 INTERNATIONAL CONFERENCE ON HYBRID INFORMATION TECHNOLOGY, VOL 1, PROCEEDINGS, 2006, : 496 - +
- [25] Is RCB a Leakage Resilient Authenticated Encryption Scheme? [J]. SECURE IT SYSTEMS, NORDSEC 2017, 2017, 10674 : 39 - 52
- [27] A secure authenticated encryption scheme and its extension [J]. PROCEEDINGS OF 2007 INTERNATIONAL WORKSHOP ON SIGNAL DESIGN AND ITS APPLICATIONS IN COMMUNICATIONS, 2007, : 74 - 78
- [28] AN ENHANCED THRESHOLD AUTHENTICATED ENCRYPTION SCHEME WITH CONVERTIBILITY [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (11): : 6177 - 6185
- [29] Authenticated encryption scheme based on quadratic residue [J]. ELECTRONICS LETTERS, 1998, 34 (22) : 2115 - 2116
- [30] Revisiting the Security of COMET Authenticated Encryption Scheme [J]. PROGRESS IN CRYPTOLOGY, INDOCRYPT 2021, 2021, 13143 : 3 - 25