Exploiting the Leakage: Analysis of Some Authenticated Encryption Schemes
Keyword(s):
2003 ◽
Vol 29
(1)
◽
pp. 101-109
◽
2017 ◽
Vol 28
(06)
◽
pp. 661-682
Toward Efficient Convertible Authenticated Encryption Schemes Using Self-Certified Public Key System
2014 ◽
Vol 8
(3)
◽
pp. 1157-1177
◽