共 50 条
- [41] Authenticated Encryption Schemes: A Systematic Review [J]. IEEE ACCESS, 2022, 10 : 14739 - 14766
- [43] The Memory-Tightness of Authenticated Encryption [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2020, PT I, 2020, 12170 : 127 - 156
- [44] Improvement on a threshold authenticated encryption scheme [J]. Journal of Software, 2010, 5 (07) : 697 - 704
- [45] Research on the authenticated encryption technology in CCSDS [J]. 2010 THE 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION (PACIIA2010), VOL I, 2010, : 189 - 192
- [46] Hardware Trojan for an authenticated encryption Minalpher [J]. IEEE Glob. Conf. Consum. Electron., GCCE, 2016,
- [47] Biometric-Authenticated Searchable Encryption [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2020), PT II, 2020, 12147 : 40 - 61
- [48] Security of authenticated encryption scheme with message linkages [J]. 2006 INTERNATIONAL CONFERENCE ON HYBRID INFORMATION TECHNOLOGY, VOL 1, PROCEEDINGS, 2006, : 496 - +
- [49] Protecting FPGA Bitstreams Using Authenticated Encryption [J]. 2013 IEEE 11TH INTERNATIONAL NEW CIRCUITS AND SYSTEMS CONFERENCE (NEWCAS), 2013,
- [50] ELmE: A Misuse Resistant Parallel Authenticated Encryption [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2014, 2014, 8544 : 306 - 321