共 50 条
- [31] Impossible differential cryptanalysis of the Gimli authenticated encryption scheme Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2022, 49 (05): : 213 - 220
- [32] A publicly verifiable authenticated encryption scheme with message linkages NETWORKING AND MOBILE COMPUTING, PROCEEDINGS, 2005, 3619 : 1271 - 1276
- [34] Convertible Authenticated Encryption Scheme with Hierarchical Access Control APPLIED MATHEMATICS & INFORMATION SCIENCES, 2014, 8 (03): : 1239 - 1246
- [35] Threshold Convertible Authenticated Encryption Scheme for Hierarchical Organizations COMMUNICATION AND NETWORKING, PT I, 2010, 119 : 23 - +
- [36] Secure Convertible Authenticated Encryption Scheme Based on RSA INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2009, 33 (04): : 481 - 486
- [38] The LOCAL Attack: Cryptanalysis of the Authenticated Encryption Scheme ALE SELECTED AREAS IN CRYPTOGRAPHY - SAC 2013, 2014, 8282 : 174 - 184