Author:
Datta Nilanjan, ,Dutta Avijit,Mancillas-López Cuauhtemoc,
Publisher
American Institute of Mathematical Sciences (AIMS)
Subject
Applied Mathematics,Discrete Mathematics and Combinatorics,Computer Networks and Communications,Algebra and Number Theory,General Earth and Planetary Sciences,General Engineering,General Environmental Science
Reference53 articles.
1.
27, I. J. S, Information technology - lightweight cryptography - part 6: Message authentication codes (MACs), ISO/IEC 29192-6, International Organization for Standardization, (2019).
2. E. Andreeva, A. S. Bhati, B. Preneel and D. Vizár, 1, 2, 3, fork: Counter mode variants based on a generalized forkcipher, IACR Trans. Symmetric Cryptol, 2021 (2021), 1-35.
3. E. Andreeva, A. S. Bhati and D. Vizár, Nonce-misuse security of the SAEF authenticated encryption mode, Selected Areas in Cryptography, Lecture Notes in Comput. Sci., Springer, Cham, 12804 (2021), 512–534.
4. E. Andreeva, A. S. Bhati and D. Vizár, RUPsecurity of the SAEF authenticated encryption mode, IACR Cryptol. ePrint Arch, (2021), 103.
5.
E. Andreeva, A. Bogdanov, N. Datta, A. Luykx, B. Mennink, M. Nandi, E. Tischhauser and K, Yasuda, COLM v1. Submission tothe CAESAR competition, CAESAR Competition, (2016), Online: https://competitions.cr.yp.to/round3/colmv1.pdf.