共 50 条
- [31] New blockcipher modes of operation with beyond the birthday bound security [J]. FAST SOFTWARE ENCRYPTION, 2006, 4047 : 310 - 327
- [32] A generic method to design modes of operation beyond the birthday bound [J]. SELECTED AREAS IN CRYPTOGRAPHY, 2007, 4876 : 328 - +
- [33] A secure authenticated encryption scheme and its extension [J]. PROCEEDINGS OF 2007 INTERNATIONAL WORKSHOP ON SIGNAL DESIGN AND ITS APPLICATIONS IN COMMUNICATIONS, 2007, : 74 - 78
- [34] Unconditionally Secure Authenticated Encryption with Shorter Keys [J]. SECURITY IN INFORMATION SYSTEMS, PROCEEDINGS, 2009, : 3 - 15
- [35] Secure remote storage through authenticated encryption [J]. PROCEEDINGS OF THE 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE, AND STORAGE, 2008, : 3 - +
- [36] TriviA: A Fast and Secure Authenticated Encryption Scheme [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015, 2015, 9293 : 330 - 353
- [37] Secure Disk with Authenticated Encryption and IV Verification [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 41 - 44
- [38] POEx: A beyond-birthday-bound-secure on-line cipher [J]. Cryptography and Communications, 2018, 10 : 177 - 193
- [39] POEX: A beyond-birthday-bound-secure on-line cipher [J]. CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2018, 10 (01): : 177 - 193
- [40] A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography [J]. Electronic Commerce Research, 2016, 16 : 113 - 139