On the security of two improved authenticated encryption schemes

被引:0
|
作者
Informatics Department, Electronics Research Institute, Cairo, Egypt [1 ]
机构
来源
Int. J. Secur. Netw. | 2013年 / 4卷 / 194-199期
关键词
D O I
10.1504/IJSN.2013.058112
中图分类号
学科分类号
摘要
18
引用
收藏
相关论文
共 50 条
  • [41] Security notes on generalization of threshold signature and authenticated encryption
    Wang, Shuhong
    Wang, Guilin
    Bao, Feng
    Wang, Jie
    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2004, E87-A (12) : 3443 - 3446
  • [42] Security notes on generalization of threshold signature and authenticated encryption
    Wang, SH
    Wang, GL
    Bao, F
    Wang, J
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (12): : 3443 - 3446
  • [43] Authenticated encryption mode for beyond the birthday bound security
    Iwata, Tetsu
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2008, 2008, 5023 : 125 - +
  • [44] On the Security of Sponge-type Authenticated Encryption Modes
    Chakraborty, Bishwajit
    Jha, Ashwin
    Nandi, Mridul
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2020, 2020 (02) : 93 - 119
  • [45] The security of the improvement on the generalization of threshold signature and authenticated encryption
    Lee, NY
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2002, E85A (10) : 2364 - 2367
  • [46] Post-Quantum Security Models for Authenticated Encryption
    Soukharev, Vladimir
    Jao, David
    Seshadri, Srinath
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2016, 2016, 9606 : 64 - 78
  • [47] Comments on the security of Chen's authenticated encryption scheme
    Rasslan, Mohamed
    Youssef, Amr
    COMPUTERS & ELECTRICAL ENGINEERING, 2011, 37 (01) : 71 - 74
  • [48] Improvement of authenticated encryption schemes with message linkages for message flows
    Hwang, MS
    Lo, JW
    Hsiao, SY
    Chu, YP
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2006, E89D (04) : 1575 - 1577
  • [49] Comparison of Authenticated-Encryption Schemes in Wireless Sensor Networks
    Simplicio, Marcos A., Jr.
    de Oliveira, Bruno T.
    Barreto, Paulo S. L. M.
    Margi, Cintia B.
    Carvalho, Tereza C. M. B.
    Naslund, Mats
    2011 IEEE 36TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2011, : 450 - 457
  • [50] Cryptanalysis of Three Authenticated Encryption Schemes for Wireless Sensor Networks
    Li, Xiaoqian
    Wang, Peng
    Li, Bao
    Sun, Zhelei
    INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2013, 2014, 8567 : 395 - 406