On the security of two improved authenticated encryption schemes

被引:0
|
作者
Informatics Department, Electronics Research Institute, Cairo, Egypt [1 ]
机构
来源
Int. J. Secur. Netw. | 2013年 / 4卷 / 194-199期
关键词
D O I
10.1504/IJSN.2013.058112
中图分类号
学科分类号
摘要
18
引用
收藏
相关论文
共 50 条
  • [21] Efficient authenticated encryption schemes with public verifiability
    Wang, GL
    Bao, F
    Ma, CS
    Chen, KF
    VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY, 2004, : 3258 - 3261
  • [22] Automated Analysis and Synthesis of Authenticated Encryption Schemes
    Viet Tung Hoang
    Katz, Jonathan
    Malozemoff, Alex J.
    CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 84 - 95
  • [23] On the (in)security of two Joint Encryption and Error Correction schemes
    Chai Q.
    Gong G.
    International Journal of Security and Networks, 2011, 6 (04) : 191 - 200
  • [24] Security analysis of two signature schemes and their improved schemes
    Zhang, Jianhong
    Mao, Jane
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2007, PT 1, PROCEEDINGS, 2007, 4705 : 589 - +
  • [25] Improved Media Security using Customized Standard Encryption Schemes
    Dhall, Sakshi
    Sharma, Swekriti
    Pal, Saibal K.
    2009 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE, VOLS 1-3, 2009, : 800 - +
  • [26] Security of authenticated encryption scheme with message linkages
    Yoon, Eun-Jun
    Yoo, Kee-Young
    2006 INTERNATIONAL CONFERENCE ON HYBRID INFORMATION TECHNOLOGY, VOL 1, PROCEEDINGS, 2006, : 496 - +
  • [27] On the security of generalization of threshold signature and authenticated encryption
    Tseng, Yuh-Min
    Jan, Jinn-Ke
    Chien, Hung-Yu
    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2001, E84-A (10) : 2606 - 2609
  • [28] Revisiting the Security of COMET Authenticated Encryption Scheme
    Gueron, Shay
    Jha, Ashwin
    Nandi, Mridul
    PROGRESS IN CRYPTOLOGY, INDOCRYPT 2021, 2021, 13143 : 3 - 25
  • [29] On the security of generalization of threshold signature and authenticated encryption
    Tseng, YM
    Jan, JK
    Chien, HY
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2001, E84A (10): : 2606 - 2609
  • [30] Authenticated encryption and steganography in unconditional security setting
    Matsumoto, T
    Shikata, J
    2005 IEEE INFORMATION THEORY WORKSHOP ON THEORY AND PRACTICE IN INFORMATION-THEORETIC SECURITY, 2005, : 1 - 6