共 50 条
- [21] Beyond-Birthday-Bound Security Based on Tweakable Block Cipher FAST SOFTWARE ENCRYPTION, 2009, 5665 : 308 - 326
- [22] Parallelizable MACs Based on the Sum of PRPs with Security Beyond the Birthday Bound APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2019, 2019, 11464 : 131 - 151
- [23] Security of authenticated encryption scheme with message linkages 2006 INTERNATIONAL CONFERENCE ON HYBRID INFORMATION TECHNOLOGY, VOL 1, PROCEEDINGS, 2006, : 496 - +
- [24] On the security of two improved authenticated encryption schemes Int. J. Secur. Netw., 2013, 4 (194-199):
- [26] Revisiting the Security of COMET Authenticated Encryption Scheme PROGRESS IN CRYPTOLOGY, INDOCRYPT 2021, 2021, 13143 : 3 - 25
- [27] On the security of generalization of threshold signature and authenticated encryption IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2001, E84A (10): : 2606 - 2609
- [28] Authenticated encryption and steganography in unconditional security setting 2005 IEEE INFORMATION THEORY WORKSHOP ON THEORY AND PRACTICE IN INFORMATION-THEORETIC SECURITY, 2005, : 1 - 6
- [29] A SUPERVISING AUTHENTICATED ENCRYPTION SCHEME FOR MULTILEVEL SECURITY INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (03): : 1087 - 1095
- [30] Security Analysis of Two Authenticated Encryption Schemes 2008 INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS SYMPOSIA, PROCEEDINGS, 2008, : 158 - 163