共 50 条
- [22] Improvement of Convertible Authenticated Encryption Schemes and Its Multiple Recipients Version [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (04): : 151 - 162
- [23] A sec-email protocol based on the convertible authenticated encryption scheme [J]. Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2010, 39 (04): : 598 - 602+622
- [24] Security Analysis of a Convertible Multiauthenticated Encryption Scheme [J]. MICRO NANO DEVICES, STRUCTURE AND COMPUTING SYSTEMS, 2011, 159 : 111 - +
- [25] Security of authenticated encryption scheme with message linkages [J]. 2006 INTERNATIONAL CONFERENCE ON HYBRID INFORMATION TECHNOLOGY, VOL 1, PROCEEDINGS, 2006, : 496 - +
- [26] On the security of two improved authenticated encryption schemes [J]. Int. J. Secur. Netw., 2013, 4 (194-199):
- [28] On the security of generalization of threshold signature and authenticated encryption [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2001, E84A (10): : 2606 - 2609
- [29] Revisiting the Security of COMET Authenticated Encryption Scheme [J]. PROGRESS IN CRYPTOLOGY, INDOCRYPT 2021, 2021, 13143 : 3 - 25
- [30] Authenticated encryption and steganography in unconditional security setting [J]. 2005 IEEE INFORMATION THEORY WORKSHOP ON THEORY AND PRACTICE IN INFORMATION-THEORETIC SECURITY, 2005, : 1 - 6