Exploiting the leakage: analysis of some authenticated encryption schemes
From MaRDI portal
Publication:1989638
DOI10.1007/978-3-319-49445-6_22zbMath1398.94103OpenAlexW2552232477MaRDI QIDQ1989638
Arpan Jati, Donghoon Chang, Naina Gupta, Amit Kumar Chauhan, Somitra Kumar Sanadhya
Publication date: 26 October 2018
Full work available at URL: https://doi.org/10.1007/978-3-319-49445-6_22
This page was built for publication: Exploiting the leakage: analysis of some authenticated encryption schemes