ISAP
From MaRDI portal
Cited in
(11)- Lightweight authenticated encryption mode suitable for threshold implementation
- Security analysis of deterministic re-keying with masking and shuffling: application to ISAP
- \textsf{TEDT2} -- highly secure leakage-resilient TBC-based authenticated encryption
- KEM-DEM
- NanGate
- tweakey
- Romulus
- Silver
- Remus
- Tornado
- FreePDK45
This page was built for software: ISAP