The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase authenticated-encryption (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1997-2002 (24) 2003-2004 (27) 2005 (24) 2006-2007 (27) 2008 (21) 2009 (22) 2010-2011 (32) 2012 (20) 2013 (23) 2014 (38) 2015 (42) 2016 (53) 2017 (46) 2018 (41) 2019 (50) 2020 (54) 2021 (34) 2022 (52) 2023 (50) 2024 (19)
Publication types (Num. hits)
article(391) incollection(5) inproceedings(293) phdthesis(10)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 132 occurrences of 51 keywords

Results
Found 699 publication records. Showing 699 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
97Yevgeniy Dodis, Jee Hea An Concealment and Its Applications to Authenticated Encryption. Search on Bibsonomy EUROCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
94Eun-Jun Yoon, Kee-Young Yoo Robust Authenticated Encryption Scheme with Message Linkages. Search on Bibsonomy KES (4) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Message linkage, Cryptography, Signature, Authenticated encryption
94Phillip Rogaway Authenticated-encryption with associated-data. Search on Bibsonomy CCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF OCB, associated-data problem, block-cipher usage, key separation, modes of operation, authenticated-encryption
82Mihir Bellare, Chanathip Namprempre Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm. Search on Bibsonomy J. Cryptol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Message authentication, Authenticated encryption, Symmetric encryption, Concrete security
81Jianhong Zhang, Cheng Ji On the Security of two Authenticated Encryption Schemes. Search on Bibsonomy ICNSC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
81Hui-Feng Huang, Chin-Chen Chang 0001 An Efficient Convertible Authenticated Encryption Scheme and Its Variant. Search on Bibsonomy ICICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
81Stefan Lucks Two-Pass Authenticated Encryption Faster Than Generic Composition. Search on Bibsonomy FSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF associated data, OMAC, provable security, authenticated encryption
80Soichi Furuya, Kouichi Sakurai Single-Path Authenticated-Encryption Scheme Based on Universal Hashing. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF real-or-random security, Stream cipher, provable security, message authentication, mode of operation
77Chanathip Namprempre Secure Channels Based on Authenticated Encryption Schemes: A Simple Characterization. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
74Ik Rae Jeong, Hee Yun Jeong, Hyun Sook Rhee, Dong Hoon Lee 0001, Jong In Lim 0001 Provably Secure Encrypt-then-Sign Composition in Hybrid Signcryption. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF encrypt-then-sign, authenticity, confidentiality, non-repudiation, signcryption, authenticated encryption, public verifiability
73Tetsu Iwata Authenticated Encryption Mode for Beyond the Birthday Bound Security. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF birthday bound, modes of operation, authenticated encryption, security proofs, Blockcipher
70Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan Osipkov Timed-Release and Key-Insulated Public Key Encryption. Search on Bibsonomy Financial Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF timed-release, key-insulated encryption, authenticated encryption
70Pierre-Alain Fouque, Antoine Joux, Gwenaëlle Martinet, Frédéric Valette Authenticated On-Line Encryption. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF blockwise adversaries, provable security, authenticated encryption, Symmetric encryption, chosen ciphertext attacks
69Ji-Seon Lee, Jik Hyun Chang Semantically Secure Authenticated Encryption Scheme and the Same Scheme for Ad-hoc Group Called a Ring. Search on Bibsonomy ITNG The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
68Zhenyu Hu, JianChun Jiang, Fuchun Sun 0001 Using IND-CVA for constructing secure communication. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF integrity, authenticated encryption, semantic security, universally composable security, secure channel
61Tianjie Cao, Dongdai Lin, Rui Xue 0001 ID-Based Ring Authenticated Encryption. Search on Bibsonomy AINA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
60Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the Encode-then-Encrypt-and-MAC paradigm. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF secure shell, stateful decryption, Authenticated encryption, security proofs
60Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre Authenticated encryption in SSH: provably fixing the SSH binary packet protocol. Search on Bibsonomy CCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF secure shell, stateful decryption, authenticated encryption, security proofs, SSH
55Shakil Ahmad, Muhammad Arif Wahla, Firdous Kausar Authenticated Encryption in WSN Using eSTREAM Ciphers. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Security, Wireless Sensor Networks, Stream Ciphers, Authenticated Encryption
55Tzer-Shyong Chen, Kuo-Hsuan Huang, Yu-Fang Chung A Division-of-Labor-Signature (t, n) Threshold-Authenticated Encryption Scheme with Message Linkage Based on the Elliptic Curve Cryptosystem. Search on Bibsonomy EEE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF (t, n) threshold signature, Authenticated Encryption Scheme, Message Linkage, Elliptic Curve Cryptosystem, Division of labor
55Jian-Zhu Lu, Huo Yan Chen Improvement of authenticated encryption scheme with (t, n) shared verification. Search on Bibsonomy COMPSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Factoring and discrete logarithms, Network security, Signature verification, Secret-sharing scheme, Authenticated encryption, Message recovery
51Mihir Bellare, Phillip Rogaway, David A. Wagner 0001 The EAX Mode of Operation. Search on Bibsonomy FSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF EAX, OMAC, provable security, message authentication, modes of operation, Authenticated encryption, CCM, CBC MAC
49Mihir Bellare, Chanathip Namprempre Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
47Pardeep Kumar 0001, Hoon-Jae Lee 0001, Wan-Young Chung A secure ubiquitous sensor network with Dragon. Search on Bibsonomy ICHIT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Dragon stream cipher, Telos B sensor mote, eSTREAM's project, authenticated encryption, sensor network security
47Peng Wang 0009, Dengguo Feng, Wenling Wu On the Security of Tweakable Modes of Operation: TBC and TAE. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF modes of operation, authenticated encryption, symmetric encryption, Blockcipher, tweakable blockcipher
47Jakob Jonsson On the Security of CTR + CBC-MAC. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF AES, modes of operation, authenticated encryption
46Shay Gueron Intel's New AES Instructions for Enhanced Performance and Security. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF new instructions set, computer architecture, Advanced Encryption Standard
44Rosario Gennaro, Shai Halevi More on Key Wrapping. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Deterministic Encryption, Key Wrapping, Modes of Operation, Symmetric Encryption
43Mengqi Zeng, Fangyong Hou, Dawu Gu, Yuanyuan Zhang 0002, NingNan Song Efficient Authenticated Encryption for Hybrid Hard Drives Based on GCM. Search on Bibsonomy HPCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
43Yin-Qiao Peng, Shi-Yi Xie, Yue-Feng Chen, Rui Deng, Ling-Xi Peng A Publicly Verifiable Authenticated Encryption Scheme with Message Linkages. Search on Bibsonomy ICCNMC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
43Chan Yeob Yeun Digital Signature with Message Recovery and Authenticated Encryption (Signcryption) - A Comparison. Search on Bibsonomy IMACC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
40Luke McAven, Reihaneh Safavi-Naini, Moti Yung Symmetric Authentication Codes with Secrecy and Unconditionally Secure Authenticated Encryption. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
38Raylin Tso, Takeshi Okamoto, Eiji Okamoto An Improved Signcryption Scheme and Its Variation. Search on Bibsonomy ITNG The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
38Chin-Chen Chang 0001, Chao-Wen Chan Detecting Dealer Cheating in Secret Sharing Systems. Search on Bibsonomy COMPSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Factoring and discrete logarithms, Network security, Signature verification, Secret-sharing scheme, Authenticated encryption, Message recovery
35Yi Mu 0001, Willy Susilo, Yan-Xia Lin, Chun Ruan Identity-Based Authenticated Broadcast Encryption and Distributed Authenticated Encryption. Search on Bibsonomy ASIAN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
35Tetsu Iwata, Kan Yasuda BTM: A Single-Key, Inverse-Cipher-Free Mode for Deterministic Authenticated Encryption. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Bivariate, random-until-bad game, systematic proof, universal hash function, counter mode
35Tetsu Iwata, Kan Yasuda HBS: A Single-Key Mode of Operation for Deterministic Authenticated Encryption. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SIV, Universal hash function, security proof, counter mode
35Pardeep Kumar 0001, Sang il Cho, Hoon-Jae Lee 0001 PingPong-MAC: secure ubiquitous sensor network with authenticated encryption. Search on Bibsonomy ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF PingPong-MAC, authentication, data integrity, stream cipher, confidentiality, ubiquitous sensor network
35Chris J. Mitchell Cryptanalysis of the EPBC Authenticated Encryption Mode. Search on Bibsonomy IMACC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
35Emilia Käsper, Peter Schwabe Faster and Timing-Attack Resistant AES-GCM. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Galois/Counter mode, cache-timing attacks, AES, fast implementations
35Yohei Hori, Akashi Satoh, Hirofumi Sakane, Kenji Toda Bitstream encryption and authentication with AES-GCM in dynamically reconfigurable systems. Search on Bibsonomy FPL The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
30Fangyong Hou, Nong Xiao, Fang Liu 0002, Hongjun He Secure Disk with Authenticated Encryption and IV Verification. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
30Guo-Lun Luo, Henry Ker-Chang Chang A new online auction with convertible authenticated encryption and authentication. Search on Bibsonomy ISI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
30Honglie Zhang, Guoyin Zhang, Jiguo Li Cryptanalysis on Generalization of Threshold Signature and Authenticated Encryption for Group Communications. Search on Bibsonomy ICICIC (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Chris J. Mitchell Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption? Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
29Raphael Schermann, Rainer Urian, Ronald Toegl, Holger Bock, Christian Steger Enabling Anonymous Authenticated Encryption with a Novel Anonymous Authenticated Credential Key Agreement (AACKA). Search on Bibsonomy TrustCom The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
29Amr Abbas, Hassan Mostafa, Ahmed Nader Mohieldin Low Area and Low Power Implementation for Competition for Authenticated Encryption, Security, Applicability, and Robustness Authenticated Ciphers. Search on Bibsonomy J. Low Power Electron. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
29Fushan Wei, Ruijie Zhang, Jian Shen 0001 A Provably Secure Two-Factor Authenticated Key Exchange Protocol for Wireless Sensor Networks Based on Authenticated Encryption. Search on Bibsonomy BWCCA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
27Palash Sarkar 0001, Sanjit Chatterjee Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks. Search on Bibsonomy ProvSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
25Phillip Rogaway, Thomas Shrimpton A Provable-Security Treatment of the Key-Wrap Problem. Search on Bibsonomy EUROCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25Pardeep Kumar 0001, Hoon-Jae Lee 0001 A Secure Data Mechanism for Ubiquitous Sensor Network with Dragon Cipher. Search on Bibsonomy NCM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Dragon Stream Cipher, eStream Project, Telos B sensor mote, Authenticated Encryption, Sensor Network Security
25Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan Osipkov Provably Secure Timed-Release Public Key Encryption. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF key-insulated encryption, timed-release, authenticated encryption
25ZhenYu Hu, Dongdai Lin, Wenling Wu, Dengguo Feng Constructing parallel long-message signcryption scheme from trapdoor permutation. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF parallel, signcryption, authenticated encryption, trapdoor permutations
25Yi-Hwa Chen, Jinn-ke Jan Enhancement of digital signature with message recovery using self-certified public keys and its variants. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF self-certified public key, authenticated encryption, forward secrecy
24Shuai Han 0001, Shengli Liu 0001, Lin Lyu 0001 Efficient KDM-CCA Secure Public-Key Encryption via Auxiliary-Input Authenticated Encryption. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
24Juraj Somorovsky, Jörg Schwenk Technical Analysis of Countermeasures against Attack on XML Encryption - or - Just Another Motivation for Authenticated Encryption. Search on Bibsonomy SERVICES The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
24Dan Harkins Synthetic Initialization Vector (SIV) Authenticated Encryption Using the Advanced Encryption Standard (AES). Search on Bibsonomy RFC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24John Black, Hector Urtubia Side-Channel Attacks on Symmetric Encryption Schemes: The Case for Authenticated Encryption. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2002 DBLP  BibTeX  RDF
22Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai A generic construction of useful client puzzles. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF identity based KEM, security notions, useful client puzzle
22Akashi Satoh, Takeshi Sugawara 0001, Takafumi Aoki High-Speed Pipelined Hardware Architecture for Galois Counter Mode. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Tetsu Iwata New Blockcipher Modes of Operation with Beyond the Birthday Bound Security. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Benoît Libert, Jean-Jacques Quisquater Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups. Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Gap Diffie-Hellman groups, provable security, signcryption
18Danial Shiraly, Ziba Eslami, Nasrollah Pakniat Certificate-based authenticated encryption with keyword search: Enhanced security model and a concrete construction for Internet of Things. Search on Bibsonomy J. Inf. Secur. Appl. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Munawar Hasan, Donghoon Chang Lynx: Family of Lightweight Authenticated Encryption Schemes Based on Tweakable Blockcipher. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Elena Andreeva 0001, Andrey Bogdanov, Nilanjan Datta, Atul Luykx, Bart Mennink, Mridul Nandi, Elmar Tischhauser, Kan Yasuda The COLM Authenticated Encryption Scheme. Search on Bibsonomy J. Cryptol. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Keita Emura Generic Construction of Public-Key Authenticated Encryption with Keyword Search Revisited. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Amar Rasheed, Mohamed Baza, Mahmoud M. Badr, Hani Alshahrani, Kim-Kwang Raymond Choo Efficient Crypto Engine for Authenticated Encryption, Data Traceability, and Replay Attack Detection Over CAN Bus Network. Search on Bibsonomy IEEE Trans. Netw. Sci. Eng. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Xiaotong Zhou, Debiao He, Jianting Ning, Min Luo 0002, Xinyi Huang 0001 Single-Server Public-Key Authenticated Encryption With Keyword Search and Its Application in IIoT. Search on Bibsonomy IEEE Trans. Netw. Sci. Eng. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Lisha Bai, Lei Yong, Zhixian Chen, Jun Shao Pairing-free public-key authenticated encryption with keyword search. Search on Bibsonomy Comput. Stand. Interfaces The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Tao Xiang 0001, Zhongming Wang, Biwen Chen, Xiaoguo Li, Peng Wang, Fei Chen StopGuess: A framework for public-key authenticated encryption with keyword search. Search on Bibsonomy Comput. Stand. Interfaces The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Ravi Anand, Subhadeep Banik, Andrea Caforio, Tatsuya Ishikawa, Takanori Isobe 0001, Fukang Liu, Kazuhiko Minematsu, Mostafizar Rahman, Kosei Sakamoto Gleeok: A Family of Low-Latency PRFs and its Applications to Authenticated Encryption. Search on Bibsonomy IACR Trans. Cryptogr. Hardw. Embed. Syst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Charlotte Lefevre A Note on Adversarial Online Complexity in Security Proofs of Duplex-Based Authenticated Encryption Modes. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
18Patrick Struck, Maximiliane Weishäupl Constructing Committing and Leakage-Resilient Authenticated Encryption. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
18Atul Luykx, Kenneth G. Paterson Limits on Authenticated Encryption Use in TLS. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
18Mustafa Khairallah Fast Parallelizable Misuse-Resistant Authenticated Encryption: Low Latency (Decryption-Fast) SIV. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
18Thomas Peters, Yaobin Shen, François-Xavier Standaert Multiplex: TBC-based Authenticated Encryption with Sponge-Like Rate. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
18Shuai Liu, Jizhou Ren, Jie Guan, Bin Hu 0011, Sudong Ma, Hao Bai A Break Of Barrier To Classical Differential Fault Attack On The Nonce-Based Authenticated Encryption Algorithm. Search on Bibsonomy Comput. J. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Patrick Struck, Maximiliane Weishäupl Constructing Committing and Leakage-Resilient Authenticated Encryption. Search on Bibsonomy IACR Trans. Symmetric Cryptol. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Yusuke Naito 0001, Yu Sasaki, Takeshi Sugawara 0001 KIVR: Committing Authenticated Encryption Using Redundancy and Application to GCM, CCM, and More. Search on Bibsonomy ACNS (1) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Keita Emura Generic Construction of Forward Secure Public Key Authenticated Encryption with Keyword Search. Search on Bibsonomy ACNS (1) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Carlos Gabriel de Araujo Gewehr, Nicolas Moura, Lucas Luza, Eduardo Bernardon, Ney Calazans, Rafael Garibotti, Fernando Gehm Moraes Hardware Acceleration of Authenticated Encryption with Associated Data via RISC-V Instruction Set Extensions in Low Power Embedded Systems. Search on Bibsonomy LASCAS The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Lisha Yao, Jian Weng 0001, Anjia Yang, Xiaojian Liang, Zhenghao Wu, Zike Jiang, Lin Hou Scalable CCA-secure public-key authenticated encryption with keyword search from ideal lattices in cloud computing. Search on Bibsonomy Inf. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Liwang Sun, Zhenfu Cao, Xiaolei Dong, Jiachen Shen LMCLAEKS: LWE-assisted multi-recipient certificateless authenticated encryption with keyword search. Search on Bibsonomy Inf. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Mohamud Ahmed Jimale, Nor Aniza Abdullah, Miss Laiha Mat Kiah, Mohd Yamani Idna Bin Idris, Muhammad Reza Z'aba, Norziana Jamil, Mohd Saufy Rohmad Sponge-Based Parallel Authenticated Encryption With Variable Tag Length and Side-Channel Protection. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Lang Pu, Chao Lin, Biwen Chen, Debiao He User-Friendly Public-Key Authenticated Encryption With Keyword Search for Industrial Internet of Things. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Iftekhar Salam, Wei-Chuen Yau, Raphaël C.-W. Phan, Josef Pieprzyk Differential fault attacks on the lightweight authenticated encryption algorithm CLX-128. Search on Bibsonomy J. Cryptogr. Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Jingwei Lu, Hongbo Li 0004, Jianye Huang, Sha Ma, Man Ho Allen Au, Qiong Huang 0001 Certificateless Public Key Authenticated Encryption with Keyword Search Achieving Stronger Security. Search on Bibsonomy Inf. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Zhenyu Hu, Lunzhi Deng, Yaying Wu, Hongyu Shi, Yan Gao 0008 Secure and Efficient Certificateless Searchable Authenticated Encryption Scheme Without Random Oracle for Industrial Internet of Things. Search on Bibsonomy IEEE Syst. J. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Xiaolin Zhang, Dawu Gu, Tengfei Wang, Yu Huang Old School, New Primitive: Toward Scalable PUF-Based Authenticated Encryption Scheme in IoT. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Xin Cheng 0001, Yixuan Xu, Kefan Wang, Yongqiang Zhang 0006, Bin Li, Zhang Zhang Lightweight and flexible hardware implementation of authenticated encryption algorithm SIMON-Galois/Counter Mode. Search on Bibsonomy Int. J. Circuit Theory Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Kenneth Odoh Tortoise: An Authenticated Encryption Scheme. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Yinsong Xu 0001, Wenjie Liu, Wenbin Yu 0002 Quantum forgery attacks on COPA, AES-COPA and marble authenticated encryption algorithms. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Pan Yang 0025, Hongbo Li 0004, Jianye Huang, Hao Zhang, Man Ho Allen Au, Qiong Huang 0001 Secure channel free public key authenticated encryption with multi-keyword search on healthcare systems. Search on Bibsonomy Future Gener. Comput. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Fucai Luo, Haiyan Wang 0009, Changlu Lin, Xingfu Yan ABAEKS: Attribute-Based Authenticated Encryption With Keyword Search Over Outsourced Encrypted Data. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Hongbo Li 0004, Qiong Huang 0001, Jianye Huang, Willy Susilo Public-Key Authenticated Encryption With Keyword Search Supporting Constant Trapdoor Generation and Fast Search. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Cuiran Li, Jixuan Wu, Zepeng Zhang, Anqi Lv Energy-harvesting Q-learning secure routing algorithm with authenticated-encryption for WSN. Search on Bibsonomy ICT Express The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Yusuke Naito 0001, Yu Sasaki, Takeshi Sugawara 0001 MMM: Authenticated Encryption with Minimum Secret State for Masking. Search on Bibsonomy IACR Trans. Cryptogr. Hardw. Embed. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Pascal Bemmann, Sebastian Berndt 0001, Denis Diemert, Thomas Eisenbarth 0001, Tibor Jager Subversion-Resilient Authenticated Encryption without Random Oracles. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
18Shashank Agrawal, Shweta Agrawal, Manoj Prabhakaran 0001, Rajeev Raghunath, Jayesh Singla CASE: A New Frontier in Public-Key Authenticated Encryption. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
18Joan Daemen, Silvia Mella, Gilles Van Assche Committing authenticated encryption based on SHAKE. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
Displaying result #1 - #100 of 699 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license