Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Software
Reference43 articles.
1. Bellare, M., Namprempre, C.: Authenticated encryption: relations among notions and analysis of the generic composition paradigm. In: ASIACRYPT. Lecture Notes in Computer Science, vol. 2501, pp. 531–545 (2000)
2. Jutla, C.: Encryption modes with almost free message integrity. J. Cryptol. 21, 547–578 (2008)
3. CAESAR competition for authenticated encryption. Secur. Appl. Robust. (2014). http://competitions.cr.yp.to/caesar.html
4. Cannière, C. D., Preneel, B.: “Trivium,” new stream cipher designs. In: The eSTREAM Finalists. Lecture Notes in Computer Science, vol. 4986, pp. 244–266 (2005)
5. Hell, M., Johansson, T., Meier, W.: Grain: a stream cipher for constrained environments. Int. J. Wirel. Mob. Comput. 2(4), 86–93 (2007)
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献