共 50 条
- [42] A survey of certificateless encryption schemes and security models International Journal of Information Security, 2008, 7 : 349 - 377
- [43] On the security of two improved authenticated encryption schemes Int. J. Secur. Netw., 2013, 4 (194-199):
- [45] Ciphertext verification security of symmetric encryption schemes SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2009, 52 (09): : 1617 - 1631
- [46] Ciphertext verification security of symmetric encryption schemes Science in China Series F: Information Sciences, 2009, 52 : 1617 - 1631
- [47] Security Analysis of Two Authenticated Encryption Schemes 2008 INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS SYMPOSIA, PROCEEDINGS, 2008, : 158 - 163
- [48] Weaknesses in Security Considerations Related to Chaos-Based Image Encryption INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2016, 2016, 9977 : 278 - 291
- [49] Machine Learning based Attack on Certain Encryption Schemes 2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS), 2019,
- [50] Sequential key derivation patterns for broadcast encryption and key predistribution schemes ADVANCES IN CRYPTOLOGY - ASIACRYPT 2003, 2003, 2894 : 374 - 391