Author:
Tadesse Abebe Abiy,Negash Shiferaw Yalemzewd,Kumar P. G. V. Suresh
Publisher
Springer International Publishing
Reference19 articles.
1. Stinson, D.R., Paterson, M.B.: Cryptography Theory and Practice, 4th edn, pp. 1–9. CRC Press, Boca Raton (2019)
2. McGrew, D., Viega, J.: The Galois/Counter Mode of operation (GCM). Submission to NIST, May 2005
3. Koteshwara, S., Das, A.: Comparative study of authenticated encryption targeting lightweight IoT applications. IEEE Des. Test 34(4), 26–33 (2017)
4. Pang, L., Kou, M., Wei, M., Li, H.: Efficient anonymous certificateless multi-receiver signcryption scheme without bilinear pairings. IEEE Access 6, 78123–78135 (2018).
https://doi.org/10.1109/access.2018.2884798
5. Zia, M., Ali, R.: Cryptanalysis and improvement of blind signcryption scheme based on elliptic curve. Electron. Lett. (2019).
https://doi.org/10.1049/el.2019.0032
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Efficient Architecture for a High Performance Authenticated Encryption Algorithm on Reconfigurable Computing;Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering;2022