共 50 条
- [2] Efficient Schemes for Committing Authenticated Encryption [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2022, PT II, 2022, 13276 : 845 - 875
- [3] On the security of two authenticated encryption schemes [J]. PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 1315 - 1319
- [4] On the security of two improved authenticated encryption schemes [J]. Int. J. Secur. Netw., 2013, 4 (194-199):
- [5] Authenticated Encryption Schemes on Java']Java Card [J]. 2019 22ND EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD), 2019, : 238 - 245
- [7] AUTHENTICATED ENCRYPTION SCHEMES WITH LOW COMMUNICATION COSTS [J]. ELECTRONICS LETTERS, 1994, 30 (15) : 1212 - 1213
- [8] Efficient authenticated encryption schemes with public verifiability [J]. VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY, 2004, : 3258 - 3261
- [9] Security Analysis of Two Authenticated Encryption Schemes [J]. 2008 INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS SYMPOSIA, PROCEEDINGS, 2008, : 158 - 163
- [10] Automated Analysis and Synthesis of Authenticated Encryption Schemes [J]. CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 84 - 95