scientific article; zbMATH DE number 1303127
From MaRDI portal
Publication:4249642
Recommendations
Cited in
(11)- Compactly committing authenticated encryption using encryptment and tweakable block cipher
- scientific article; zbMATH DE number 1706338 (Why is no real title available?)
- Speeding up exponentiation using an untrusted computational resource
- scientific article; zbMATH DE number 2009964 (Why is no real title available?)
- On the security of remotely keyed encryption
- scientific article; zbMATH DE number 1418247 (Why is no real title available?)
- scientific article; zbMATH DE number 1418248 (Why is no real title available?)
- Concealment and its applications to authenticated encryption
- Sp-AELM: sponge based authenticated encryption scheme for memory constrained devices
- Breaking the Shin-Shin-Rhee remotely keyed encryption schemes
- scientific article; zbMATH DE number 1583805 (Why is no real title available?)
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4249642)