共 50 条
- [21] On the security of two improved authenticated encryption schemes Int. J. Secur. Netw., 2013, 4 (194-199):
- [22] Revisiting the Security of COMET Authenticated Encryption Scheme PROGRESS IN CRYPTOLOGY, INDOCRYPT 2021, 2021, 13143 : 3 - 25
- [23] Authenticated encryption and steganography in unconditional security setting 2005 IEEE INFORMATION THEORY WORKSHOP ON THEORY AND PRACTICE IN INFORMATION-THEORETIC SECURITY, 2005, : 1 - 6
- [24] A SUPERVISING AUTHENTICATED ENCRYPTION SCHEME FOR MULTILEVEL SECURITY INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (03): : 1087 - 1095
- [25] Security Analysis of Two Authenticated Encryption Schemes 2008 INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS SYMPOSIA, PROCEEDINGS, 2008, : 158 - 163
- [26] Modeling Memory Faults in Signature and Authenticated Encryption Schemes TOPICS IN CRYPTOLOGY, CT-RSA 2020, 2020, 12006 : 56 - 84
- [27] On the security of joint signature and encryption ADVANCES IN CRYPTOLOGY - EUROCRYPT 2002, PROCEEDINGS, 2002, 2332 : 83 - 107
- [29] Threshold Convertible Authenticated Encryption Scheme for Hierarchical Organizations COMMUNICATION AND NETWORKING, PT I, 2010, 119 : 23 - +
- [30] Authenticated encryption schemes with message linkage for threshold signatures AINA 2005: 19TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2, 2005, : 261 - 264