共 50 条
- [21] Extended abstract: Provable-security analysis of authenticated encryption in kerberos [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 92 - +
- [23] Security of authenticated encryption scheme with message linkages [J]. 2006 INTERNATIONAL CONFERENCE ON HYBRID INFORMATION TECHNOLOGY, VOL 1, PROCEEDINGS, 2006, : 496 - +
- [24] Revisiting the Security of COMET Authenticated Encryption Scheme [J]. PROGRESS IN CRYPTOLOGY, INDOCRYPT 2021, 2021, 13143 : 3 - 25
- [25] A SUPERVISING AUTHENTICATED ENCRYPTION SCHEME FOR MULTILEVEL SECURITY [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (03): : 1087 - 1095
- [26] A sec-email protocol based on the convertible authenticated encryption scheme [J]. Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2010, 39 (04): : 598 - 602
- [27] On the security of two improved authenticated encryption schemes [J]. Int. J. Secur. Netw., 2013, 4 (194-199):
- [28] Improved Encryption Padding for ECC System with Provable Security [J]. LECTURE NOTES IN REAL-TIME INTELLIGENT SYSTEMS (RTIS 2016), 2018, 613 : 231 - 239