共 50 条
- [22] Comparison of Authenticated-Encryption Schemes in Wireless Sensor Networks 2011 IEEE 36TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2011, : 450 - 457
- [23] Cryptanalysis of Three Authenticated Encryption Schemes for Wireless Sensor Networks INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2013, 2014, 8567 : 395 - 406
- [24] Secure channels based on authenticated encryption schemes: A simple characterization ADVANCES IN CRYPTOLOGY - ASIACRYPT 2002, PROCEEDINGS, 2002, 2501 : 515 - 532
- [25] On the Related-Key Attack Security of Authenticated Encryption Schemes SECURITY AND CRYPTOGRAPHY FOR NETWORKS (SCN 2022), 2022, 13409 : 362 - 386
- [27] Forging Attacks on Two Authenticated Encryption Schemes COBRA and POET ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT I, 2014, 8873 : 126 - 140
- [30] On the Security of Hwang-Lo-Hsiao-Chu Authenticated Encryption Schemes 4TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2013), THE 3RD INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2013), 2013, 19 : 565 - 569