共 50 条
- [21] Efficient authenticated encryption schemes with public verifiability VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY, 2004, : 3258 - 3261
- [22] Automated Analysis and Synthesis of Authenticated Encryption Schemes CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 84 - 95
- [24] Security analysis of two signature schemes and their improved schemes COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2007, PT 1, PROCEEDINGS, 2007, 4705 : 589 - +
- [25] Improved Media Security using Customized Standard Encryption Schemes 2009 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE, VOLS 1-3, 2009, : 800 - +
- [26] Security of authenticated encryption scheme with message linkages 2006 INTERNATIONAL CONFERENCE ON HYBRID INFORMATION TECHNOLOGY, VOL 1, PROCEEDINGS, 2006, : 496 - +
- [28] Revisiting the Security of COMET Authenticated Encryption Scheme PROGRESS IN CRYPTOLOGY, INDOCRYPT 2021, 2021, 13143 : 3 - 25
- [29] On the security of generalization of threshold signature and authenticated encryption IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2001, E84A (10): : 2606 - 2609
- [30] Authenticated encryption and steganography in unconditional security setting 2005 IEEE INFORMATION THEORY WORKSHOP ON THEORY AND PRACTICE IN INFORMATION-THEORETIC SECURITY, 2005, : 1 - 6