共 50 条
- [42] Comparison of Authenticated-Encryption Schemes in Wireless Sensor Networks 2011 IEEE 36TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2011, : 450 - 457
- [43] Cryptanalysis of Three Authenticated Encryption Schemes for Wireless Sensor Networks INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2013, 2014, 8567 : 395 - 406
- [44] On the Related-Key Attack Security of Authenticated Encryption Schemes SECURITY AND CRYPTOGRAPHY FOR NETWORKS (SCN 2022), 2022, 13409 : 362 - 386
- [45] Beyond 2c/2 Security in Sponge-Based Authenticated Encryption Modes ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT I, 2014, 8873 : 85 - 104
- [47] Forging Attacks on Two Authenticated Encryption Schemes COBRA and POET ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT I, 2014, 8873 : 126 - 140
- [50] AEUR: authenticated encryption algorithm design based on uBlock round function Tongxin Xuebao/Journal on Communications, 2023, 44 (08): : 168 - 178