Author:
Bellare Mihir,Goldreich Oded,Goldwasser Shafi
Cited by
74 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Review of VLSI Architecture of Cryptography Algorithm for IOT Security;Proceedings of the 6th International Conference on Communications and Cyber Physical Engineering;2024
2. Toward Efficient Homomorphic Encryption for Outsourced Databases through Parallel Caching;Proceedings of the ACM on Management of Data;2023-05-26
3. Secure storage—Confidentiality and authentication;Computer Science Review;2022-05
4. Authenticated Encryption Schemes: A Systematic Review;IEEE Access;2022
5. Securing Surveillance Data Using Incremental Cryptography;Proceedings of the 13th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2021);2022