共 40 条
- [2] Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering Schemes INFORMATION SECURITY AND PRIVACY (ACISP 2015), 2015, 9144 : 3 - 19
- [3] Tweakable enciphering schemes from hash-sum-expansion PROGRESS IN CRYPTOLOGY - INDOCRYPT 2007, 2007, 4859 : 252 - 267
- [5] HCH: A new tweakable enciphering scheme using the hash-encrypt-hash approach PROGRESS IN CRYPTOLOGY - INDOCRYPT 2006, PROCEEDINGS, 2006, 4329 : 287 - +
- [6] Efficient implementations of some tweakable enciphering schemes in reconfigurable hardware PROGRESS IN CRYPTOLOGY - INDOCRYPT 2007, 2007, 4859 : 414 - 424
- [8] Reliable Hardware Architectures for Efficient Secure Hash Functions ECHO and Fugue 2018 ACM INTERNATIONAL CONFERENCE ON COMPUTING FRONTIERS, 2018, : 204 - 207