共 50 条
- [21] New Constructions of Identity-Based and Key-Dependent Message Secure Encryption Schemes PUBLIC-KEY CRYPTOGRAPHY - PKC 2018, PT I, 2018, 10769 : 3 - 31
- [22] COMPLEXITY ANALYSIS OF THE KEY-DEPENDENT WAVELET PACKET TRANSFORM FOR JPEG2000 ENCRYPTION 2012 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP 2012), 2012, : 2633 - 2636
- [23] Construction of a key-dependent message secure symmetric encryption scheme in the ideal cipher model Frontiers of Computer Science, 2014, 8 : 469 - 477
- [25] Bounded Key-Dependent Message Security ADVANCES IN CRYPTOLOGY - EUROCRYPT 2010, 2010, 6110 : 423 - +
- [26] Security Under Key-Dependent Inputs CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 466 - 475
- [27] Enhance Security of Advance Encryption Standard Algorithm Based on Key-dependent S-Box 2015 FIFTH INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION PROCESSING AND COMMUNICATIONS (ICDIPC), 2015, : 44 - 53
- [28] The Key-Dependent Attack on Block Ciphers ADVANCES IN CRYPTOLOGY - ASIACRYPT 2009, 2009, 5912 : 19 - 36
- [29] Nonce-Misuse Security of the SAEF Authenticated Encryption Mode SELECTED AREAS IN CRYPTOGRAPHY, 2021, 12804 : 512 - 534
- [30] Key-dependent message security under active attacks - BRSIM/UC-soundness of symbolic encryption with key cycles 20TH IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSFS20), PROCEEDINGS, 2007, : 112 - +