Author:
Bellare M.,Desai A.,Jokipii E.,Rogaway P.
Cited by
407 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Segment-Based Formal Verification of WiFi Fragmentation and Power Save Mode;Proceedings of the 19th ACM Asia Conference on Computer and Communications Security;2024-07
2. A modified RC‐4 cryptosystems to enhance security by using negative key schedule;SECURITY AND PRIVACY;2024-06-29
3. Bit Security as Cost to Demonstrate Advantage;IACR Communications in Cryptology;2024-04-09
4. Retinal Authentication for E-Voting;2024 IEEE 9th International Conference for Convergence in Technology (I2CT);2024-04-05
5. Small Stretch Problem of the DCT Scheme and How to Fix It;IACR Transactions on Symmetric Cryptology;2024-03-01