共 50 条
- [33] Cryptanalysis and improvement of two convertible authenticated encryption schemes Dianzi Yu Xinxi Xuebao, 2006, 1 (151-153):
- [34] Authenticated Encryption Based on SM4 Round Function Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2018, 46 (06): : 1294 - 1299
- [35] sp-AELM: Sponge Based Authenticated Encryption Scheme for Memory Constrained Devices INFORMATION SECURITY AND PRIVACY (ACISP 2015), 2015, 9144 : 451 - 468
- [37] Side-channel attacks on symmetric encryption schemes: The case for authenticated encryption USENIX ASSOCIATION PROCEEDINGS OF THE 11TH USENIX SECURITY SYMPOSIUM, 2002, : 327 - 338
- [38] Integrity analysis of authenticated encryption based on stream ciphers International Journal of Information Security, 2018, 17 : 493 - 511
- [39] Integrity Analysis of Authenticated Encryption Based on Stream Ciphers PROVABLE SECURITY, (PROVSEC 2016), 2016, 10005 : 257 - 276
- [40] On the Post-quantum Security of Classical Authenticated Encryption Schemes PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2023, 2023, 14064 : 79 - 104