On the security of two improved authenticated encryption schemes

被引:0
|
作者
Informatics Department, Electronics Research Institute, Cairo, Egypt [1 ]
机构
来源
Int. J. Secur. Netw. | 2013年 / 4卷 / 194-199期
关键词
D O I
10.1504/IJSN.2013.058112
中图分类号
学科分类号
摘要
18
引用
收藏
相关论文
共 50 条
  • [31] A SUPERVISING AUTHENTICATED ENCRYPTION SCHEME FOR MULTILEVEL SECURITY
    Hsu, Chien-Lung
    Chang, Lang-Peng
    Wu, Tzong-Chen
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (03): : 1087 - 1095
  • [32] Modeling Memory Faults in Signature and Authenticated Encryption Schemes
    Fischlin, Marc
    Gunther, Felix
    TOPICS IN CRYPTOLOGY, CT-RSA 2020, 2020, 12006 : 56 - 84
  • [33] Authenticated encryption schemes with message linkages for message flows
    Tseng, YM
    Jan, JK
    Chien, HY
    COMPUTERS & ELECTRICAL ENGINEERING, 2003, 29 (01) : 101 - 109
  • [34] Artemia: A Family of Provably Secure Authenticated Encryption Schemes
    Alizadeh, Javad
    Aref, Mohammad Reza
    Bagheri, Nasour
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 6 (02): : 125 - 139
  • [35] Analysis of Sponge Function Based Authenticated Encryption Schemes
    Krishnan, Lekshmi R.
    Sindhu, M.
    Srinivasan, Chungath
    2017 4TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2017,
  • [36] Authenticated encryption schemes with message linkage for threshold signatures
    Huang, CH
    Lee, CY
    Lin, CH
    Chang, CC
    Chen, KL
    AINA 2005: 19TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2, 2005, : 261 - 264
  • [37] General classification of the authenticated encryption schemes for the CAESAR competition
    Abed, Farzaneh
    Forler, Christian
    Lucks, Stefan
    COMPUTER SCIENCE REVIEW, 2016, 22 : 13 - 26
  • [38] Authenticated encryption schemes with linkage between message blocks
    Lee, WB
    Chang, CC
    INFORMATION PROCESSING LETTERS, 1997, 63 (05) : 247 - 250
  • [39] Side-channel attacks on symmetric encryption schemes: The case for authenticated encryption
    Black, J
    Urtubia, H
    USENIX ASSOCIATION PROCEEDINGS OF THE 11TH USENIX SECURITY SYMPOSIUM, 2002, : 327 - 338
  • [40] Provable-security analysis of authenticated encryption in Kerberos
    Boldyreva, A.
    Kumar, V.
    IET INFORMATION SECURITY, 2011, 5 (04) : 207 - 219