Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
97 | Yevgeniy Dodis, Jee Hea An |
Concealment and Its Applications to Authenticated Encryption. |
EUROCRYPT |
2003 |
DBLP DOI BibTeX RDF |
|
94 | Eun-Jun Yoon, Kee-Young Yoo |
Robust Authenticated Encryption Scheme with Message Linkages. |
KES (4) |
2005 |
DBLP DOI BibTeX RDF |
Message linkage, Cryptography, Signature, Authenticated encryption |
94 | Phillip Rogaway |
Authenticated-encryption with associated-data. |
CCS |
2002 |
DBLP DOI BibTeX RDF |
OCB, associated-data problem, block-cipher usage, key separation, modes of operation, authenticated-encryption |
82 | Mihir Bellare, Chanathip Namprempre |
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm. |
J. Cryptol. |
2008 |
DBLP DOI BibTeX RDF |
Message authentication, Authenticated encryption, Symmetric encryption, Concrete security |
81 | Jianhong Zhang, Cheng Ji |
On the Security of two Authenticated Encryption Schemes. |
ICNSC |
2008 |
DBLP DOI BibTeX RDF |
|
81 | Hui-Feng Huang, Chin-Chen Chang 0001 |
An Efficient Convertible Authenticated Encryption Scheme and Its Variant. |
ICICS |
2003 |
DBLP DOI BibTeX RDF |
|
81 | Stefan Lucks |
Two-Pass Authenticated Encryption Faster Than Generic Composition. |
FSE |
2005 |
DBLP DOI BibTeX RDF |
associated data, OMAC, provable security, authenticated encryption |
80 | Soichi Furuya, Kouichi Sakurai |
Single-Path Authenticated-Encryption Scheme Based on Universal Hashing. |
Selected Areas in Cryptography |
2002 |
DBLP DOI BibTeX RDF |
real-or-random security, Stream cipher, provable security, message authentication, mode of operation |
77 | Chanathip Namprempre |
Secure Channels Based on Authenticated Encryption Schemes: A Simple Characterization. |
ASIACRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
74 | Ik Rae Jeong, Hee Yun Jeong, Hyun Sook Rhee, Dong Hoon Lee 0001, Jong In Lim 0001 |
Provably Secure Encrypt-then-Sign Composition in Hybrid Signcryption. |
ICISC |
2002 |
DBLP DOI BibTeX RDF |
encrypt-then-sign, authenticity, confidentiality, non-repudiation, signcryption, authenticated encryption, public verifiability |
73 | Tetsu Iwata |
Authenticated Encryption Mode for Beyond the Birthday Bound Security. |
AFRICACRYPT |
2008 |
DBLP DOI BibTeX RDF |
birthday bound, modes of operation, authenticated encryption, security proofs, Blockcipher |
70 | Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan Osipkov |
Timed-Release and Key-Insulated Public Key Encryption. |
Financial Cryptography |
2006 |
DBLP DOI BibTeX RDF |
timed-release, key-insulated encryption, authenticated encryption |
70 | Pierre-Alain Fouque, Antoine Joux, Gwenaëlle Martinet, Frédéric Valette |
Authenticated On-Line Encryption. |
Selected Areas in Cryptography |
2003 |
DBLP DOI BibTeX RDF |
blockwise adversaries, provable security, authenticated encryption, Symmetric encryption, chosen ciphertext attacks |
69 | Ji-Seon Lee, Jik Hyun Chang |
Semantically Secure Authenticated Encryption Scheme and the Same Scheme for Ad-hoc Group Called a Ring. |
ITNG |
2007 |
DBLP DOI BibTeX RDF |
|
68 | Zhenyu Hu, JianChun Jiang, Fuchun Sun 0001 |
Using IND-CVA for constructing secure communication. |
Sci. China Ser. F Inf. Sci. |
2009 |
DBLP DOI BibTeX RDF |
integrity, authenticated encryption, semantic security, universally composable security, secure channel |
61 | Tianjie Cao, Dongdai Lin, Rui Xue 0001 |
ID-Based Ring Authenticated Encryption. |
AINA |
2005 |
DBLP DOI BibTeX RDF |
|
60 | Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre |
Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the Encode-then-Encrypt-and-MAC paradigm. |
ACM Trans. Inf. Syst. Secur. |
2004 |
DBLP DOI BibTeX RDF |
secure shell, stateful decryption, Authenticated encryption, security proofs |
60 | Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre |
Authenticated encryption in SSH: provably fixing the SSH binary packet protocol. |
CCS |
2002 |
DBLP DOI BibTeX RDF |
secure shell, stateful decryption, authenticated encryption, security proofs, SSH |
55 | Shakil Ahmad, Muhammad Arif Wahla, Firdous Kausar |
Authenticated Encryption in WSN Using eSTREAM Ciphers. |
ISA |
2009 |
DBLP DOI BibTeX RDF |
Security, Wireless Sensor Networks, Stream Ciphers, Authenticated Encryption |
55 | Tzer-Shyong Chen, Kuo-Hsuan Huang, Yu-Fang Chung |
A Division-of-Labor-Signature (t, n) Threshold-Authenticated Encryption Scheme with Message Linkage Based on the Elliptic Curve Cryptosystem. |
EEE |
2004 |
DBLP DOI BibTeX RDF |
(t, n) threshold signature, Authenticated Encryption Scheme, Message Linkage, Elliptic Curve Cryptosystem, Division of labor |
55 | Jian-Zhu Lu, Huo Yan Chen |
Improvement of authenticated encryption scheme with (t, n) shared verification. |
COMPSAC |
2000 |
DBLP DOI BibTeX RDF |
Factoring and discrete logarithms, Network security, Signature verification, Secret-sharing scheme, Authenticated encryption, Message recovery |
51 | Mihir Bellare, Phillip Rogaway, David A. Wagner 0001 |
The EAX Mode of Operation. |
FSE |
2004 |
DBLP DOI BibTeX RDF |
EAX, OMAC, provable security, message authentication, modes of operation, Authenticated encryption, CCM, CBC MAC |
49 | Mihir Bellare, Chanathip Namprempre |
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
47 | Pardeep Kumar 0001, Hoon-Jae Lee 0001, Wan-Young Chung |
A secure ubiquitous sensor network with Dragon. |
ICHIT |
2009 |
DBLP DOI BibTeX RDF |
Dragon stream cipher, Telos B sensor mote, eSTREAM's project, authenticated encryption, sensor network security |
47 | Peng Wang 0009, Dengguo Feng, Wenling Wu |
On the Security of Tweakable Modes of Operation: TBC and TAE. |
ISC |
2005 |
DBLP DOI BibTeX RDF |
modes of operation, authenticated encryption, symmetric encryption, Blockcipher, tweakable blockcipher |
47 | Jakob Jonsson |
On the Security of CTR + CBC-MAC. |
Selected Areas in Cryptography |
2002 |
DBLP DOI BibTeX RDF |
AES, modes of operation, authenticated encryption |
46 | Shay Gueron |
Intel's New AES Instructions for Enhanced Performance and Security. |
FSE |
2009 |
DBLP DOI BibTeX RDF |
new instructions set, computer architecture, Advanced Encryption Standard |
44 | Rosario Gennaro, Shai Halevi |
More on Key Wrapping. |
Selected Areas in Cryptography |
2009 |
DBLP DOI BibTeX RDF |
Deterministic Encryption, Key Wrapping, Modes of Operation, Symmetric Encryption |
43 | Mengqi Zeng, Fangyong Hou, Dawu Gu, Yuanyuan Zhang 0002, NingNan Song |
Efficient Authenticated Encryption for Hybrid Hard Drives Based on GCM. |
HPCC |
2008 |
DBLP DOI BibTeX RDF |
|
43 | Yin-Qiao Peng, Shi-Yi Xie, Yue-Feng Chen, Rui Deng, Ling-Xi Peng |
A Publicly Verifiable Authenticated Encryption Scheme with Message Linkages. |
ICCNMC |
2005 |
DBLP DOI BibTeX RDF |
|
43 | Chan Yeob Yeun |
Digital Signature with Message Recovery and Authenticated Encryption (Signcryption) - A Comparison. |
IMACC |
1999 |
DBLP DOI BibTeX RDF |
|
40 | Luke McAven, Reihaneh Safavi-Naini, Moti Yung |
Symmetric Authentication Codes with Secrecy and Unconditionally Secure Authenticated Encryption. |
INDOCRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
38 | Raylin Tso, Takeshi Okamoto, Eiji Okamoto |
An Improved Signcryption Scheme and Its Variation. |
ITNG |
2007 |
DBLP DOI BibTeX RDF |
|
38 | Chin-Chen Chang 0001, Chao-Wen Chan |
Detecting Dealer Cheating in Secret Sharing Systems. |
COMPSAC |
2000 |
DBLP DOI BibTeX RDF |
Factoring and discrete logarithms, Network security, Signature verification, Secret-sharing scheme, Authenticated encryption, Message recovery |
35 | Yi Mu 0001, Willy Susilo, Yan-Xia Lin, Chun Ruan |
Identity-Based Authenticated Broadcast Encryption and Distributed Authenticated Encryption. |
ASIAN |
2004 |
DBLP DOI BibTeX RDF |
|
35 | Tetsu Iwata, Kan Yasuda |
BTM: A Single-Key, Inverse-Cipher-Free Mode for Deterministic Authenticated Encryption. |
Selected Areas in Cryptography |
2009 |
DBLP DOI BibTeX RDF |
Bivariate, random-until-bad game, systematic proof, universal hash function, counter mode |
35 | Tetsu Iwata, Kan Yasuda |
HBS: A Single-Key Mode of Operation for Deterministic Authenticated Encryption. |
FSE |
2009 |
DBLP DOI BibTeX RDF |
SIV, Universal hash function, security proof, counter mode |
35 | Pardeep Kumar 0001, Sang il Cho, Hoon-Jae Lee 0001 |
PingPong-MAC: secure ubiquitous sensor network with authenticated encryption. |
ICIS |
2009 |
DBLP DOI BibTeX RDF |
PingPong-MAC, authentication, data integrity, stream cipher, confidentiality, ubiquitous sensor network |
35 | Chris J. Mitchell |
Cryptanalysis of the EPBC Authenticated Encryption Mode. |
IMACC |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Emilia Käsper, Peter Schwabe |
Faster and Timing-Attack Resistant AES-GCM. |
CHES |
2009 |
DBLP DOI BibTeX RDF |
Galois/Counter mode, cache-timing attacks, AES, fast implementations |
35 | Yohei Hori, Akashi Satoh, Hirofumi Sakane, Kenji Toda |
Bitstream encryption and authentication with AES-GCM in dynamically reconfigurable systems. |
FPL |
2008 |
DBLP DOI BibTeX RDF |
|
30 | Fangyong Hou, Nong Xiao, Fang Liu 0002, Hongjun He |
Secure Disk with Authenticated Encryption and IV Verification. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
30 | Guo-Lun Luo, Henry Ker-Chang Chang |
A new online auction with convertible authenticated encryption and authentication. |
ISI |
2008 |
DBLP DOI BibTeX RDF |
|
30 | Honglie Zhang, Guoyin Zhang, Jiguo Li |
Cryptanalysis on Generalization of Threshold Signature and Authenticated Encryption for Group Communications. |
ICICIC (3) |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Chris J. Mitchell |
Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption? |
ISC |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Raphael Schermann, Rainer Urian, Ronald Toegl, Holger Bock, Christian Steger |
Enabling Anonymous Authenticated Encryption with a Novel Anonymous Authenticated Credential Key Agreement (AACKA). |
TrustCom |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Amr Abbas, Hassan Mostafa, Ahmed Nader Mohieldin |
Low Area and Low Power Implementation for Competition for Authenticated Encryption, Security, Applicability, and Robustness Authenticated Ciphers. |
J. Low Power Electron. |
2019 |
DBLP DOI BibTeX RDF |
|
29 | Fushan Wei, Ruijie Zhang, Jian Shen 0001 |
A Provably Secure Two-Factor Authenticated Key Exchange Protocol for Wireless Sensor Networks Based on Authenticated Encryption. |
BWCCA |
2016 |
DBLP DOI BibTeX RDF |
|
27 | Palash Sarkar 0001, Sanjit Chatterjee |
Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks. |
ProvSec |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Phillip Rogaway, Thomas Shrimpton |
A Provable-Security Treatment of the Key-Wrap Problem. |
EUROCRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Pardeep Kumar 0001, Hoon-Jae Lee 0001 |
A Secure Data Mechanism for Ubiquitous Sensor Network with Dragon Cipher. |
NCM |
2009 |
DBLP DOI BibTeX RDF |
Dragon Stream Cipher, eStream Project, Telos B sensor mote, Authenticated Encryption, Sensor Network Security |
25 | Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan Osipkov |
Provably Secure Timed-Release Public Key Encryption. |
ACM Trans. Inf. Syst. Secur. |
2008 |
DBLP DOI BibTeX RDF |
key-insulated encryption, timed-release, authenticated encryption |
25 | ZhenYu Hu, Dongdai Lin, Wenling Wu, Dengguo Feng |
Constructing parallel long-message signcryption scheme from trapdoor permutation. |
Sci. China Ser. F Inf. Sci. |
2007 |
DBLP DOI BibTeX RDF |
parallel, signcryption, authenticated encryption, trapdoor permutations |
25 | Yi-Hwa Chen, Jinn-ke Jan |
Enhancement of digital signature with message recovery using self-certified public keys and its variants. |
ACM SIGOPS Oper. Syst. Rev. |
2005 |
DBLP DOI BibTeX RDF |
self-certified public key, authenticated encryption, forward secrecy |
24 | Shuai Han 0001, Shengli Liu 0001, Lin Lyu 0001 |
Efficient KDM-CCA Secure Public-Key Encryption via Auxiliary-Input Authenticated Encryption. |
Secur. Commun. Networks |
2017 |
DBLP DOI BibTeX RDF |
|
24 | Juraj Somorovsky, Jörg Schwenk |
Technical Analysis of Countermeasures against Attack on XML Encryption - or - Just Another Motivation for Authenticated Encryption. |
SERVICES |
2012 |
DBLP DOI BibTeX RDF |
|
24 | Dan Harkins |
Synthetic Initialization Vector (SIV) Authenticated Encryption Using the Advanced Encryption Standard (AES). |
RFC |
2008 |
DBLP DOI BibTeX RDF |
|
24 | John Black, Hector Urtubia |
Side-Channel Attacks on Symmetric Encryption Schemes: The Case for Authenticated Encryption. |
USENIX Security Symposium |
2002 |
DBLP BibTeX RDF |
|
22 | Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai |
A generic construction of useful client puzzles. |
AsiaCCS |
2009 |
DBLP DOI BibTeX RDF |
identity based KEM, security notions, useful client puzzle |
22 | Akashi Satoh, Takeshi Sugawara 0001, Takafumi Aoki |
High-Speed Pipelined Hardware Architecture for Galois Counter Mode. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Tetsu Iwata |
New Blockcipher Modes of Operation with Beyond the Birthday Bound Security. |
FSE |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Benoît Libert, Jean-Jacques Quisquater |
Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups. |
Public Key Cryptography |
2004 |
DBLP DOI BibTeX RDF |
Gap Diffie-Hellman groups, provable security, signcryption |
18 | Danial Shiraly, Ziba Eslami, Nasrollah Pakniat |
Certificate-based authenticated encryption with keyword search: Enhanced security model and a concrete construction for Internet of Things. |
J. Inf. Secur. Appl. |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Munawar Hasan, Donghoon Chang |
Lynx: Family of Lightweight Authenticated Encryption Schemes Based on Tweakable Blockcipher. |
IEEE Internet Things J. |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Elena Andreeva 0001, Andrey Bogdanov, Nilanjan Datta, Atul Luykx, Bart Mennink, Mridul Nandi, Elmar Tischhauser, Kan Yasuda |
The COLM Authenticated Encryption Scheme. |
J. Cryptol. |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Keita Emura |
Generic Construction of Public-Key Authenticated Encryption with Keyword Search Revisited. |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Amar Rasheed, Mohamed Baza, Mahmoud M. Badr, Hani Alshahrani, Kim-Kwang Raymond Choo |
Efficient Crypto Engine for Authenticated Encryption, Data Traceability, and Replay Attack Detection Over CAN Bus Network. |
IEEE Trans. Netw. Sci. Eng. |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Xiaotong Zhou, Debiao He, Jianting Ning, Min Luo 0002, Xinyi Huang 0001 |
Single-Server Public-Key Authenticated Encryption With Keyword Search and Its Application in IIoT. |
IEEE Trans. Netw. Sci. Eng. |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Lisha Bai, Lei Yong, Zhixian Chen, Jun Shao |
Pairing-free public-key authenticated encryption with keyword search. |
Comput. Stand. Interfaces |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Tao Xiang 0001, Zhongming Wang, Biwen Chen, Xiaoguo Li, Peng Wang, Fei Chen |
StopGuess: A framework for public-key authenticated encryption with keyword search. |
Comput. Stand. Interfaces |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Ravi Anand, Subhadeep Banik, Andrea Caforio, Tatsuya Ishikawa, Takanori Isobe 0001, Fukang Liu, Kazuhiko Minematsu, Mostafizar Rahman, Kosei Sakamoto |
Gleeok: A Family of Low-Latency PRFs and its Applications to Authenticated Encryption. |
IACR Trans. Cryptogr. Hardw. Embed. Syst. |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Charlotte Lefevre |
A Note on Adversarial Online Complexity in Security Proofs of Duplex-Based Authenticated Encryption Modes. |
IACR Cryptol. ePrint Arch. |
2024 |
DBLP BibTeX RDF |
|
18 | Patrick Struck, Maximiliane Weishäupl |
Constructing Committing and Leakage-Resilient Authenticated Encryption. |
IACR Cryptol. ePrint Arch. |
2024 |
DBLP BibTeX RDF |
|
18 | Atul Luykx, Kenneth G. Paterson |
Limits on Authenticated Encryption Use in TLS. |
IACR Cryptol. ePrint Arch. |
2024 |
DBLP BibTeX RDF |
|
18 | Mustafa Khairallah |
Fast Parallelizable Misuse-Resistant Authenticated Encryption: Low Latency (Decryption-Fast) SIV. |
IACR Cryptol. ePrint Arch. |
2024 |
DBLP BibTeX RDF |
|
18 | Thomas Peters, Yaobin Shen, François-Xavier Standaert |
Multiplex: TBC-based Authenticated Encryption with Sponge-Like Rate. |
IACR Cryptol. ePrint Arch. |
2024 |
DBLP BibTeX RDF |
|
18 | Shuai Liu, Jizhou Ren, Jie Guan, Bin Hu 0011, Sudong Ma, Hao Bai |
A Break Of Barrier To Classical Differential Fault Attack On The Nonce-Based Authenticated Encryption Algorithm. |
Comput. J. |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Patrick Struck, Maximiliane Weishäupl |
Constructing Committing and Leakage-Resilient Authenticated Encryption. |
IACR Trans. Symmetric Cryptol. |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Yusuke Naito 0001, Yu Sasaki, Takeshi Sugawara 0001 |
KIVR: Committing Authenticated Encryption Using Redundancy and Application to GCM, CCM, and More. |
ACNS (1) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Keita Emura |
Generic Construction of Forward Secure Public Key Authenticated Encryption with Keyword Search. |
ACNS (1) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Carlos Gabriel de Araujo Gewehr, Nicolas Moura, Lucas Luza, Eduardo Bernardon, Ney Calazans, Rafael Garibotti, Fernando Gehm Moraes |
Hardware Acceleration of Authenticated Encryption with Associated Data via RISC-V Instruction Set Extensions in Low Power Embedded Systems. |
LASCAS |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Lisha Yao, Jian Weng 0001, Anjia Yang, Xiaojian Liang, Zhenghao Wu, Zike Jiang, Lin Hou |
Scalable CCA-secure public-key authenticated encryption with keyword search from ideal lattices in cloud computing. |
Inf. Sci. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Liwang Sun, Zhenfu Cao, Xiaolei Dong, Jiachen Shen |
LMCLAEKS: LWE-assisted multi-recipient certificateless authenticated encryption with keyword search. |
Inf. Sci. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Mohamud Ahmed Jimale, Nor Aniza Abdullah, Miss Laiha Mat Kiah, Mohd Yamani Idna Bin Idris, Muhammad Reza Z'aba, Norziana Jamil, Mohd Saufy Rohmad |
Sponge-Based Parallel Authenticated Encryption With Variable Tag Length and Side-Channel Protection. |
IEEE Access |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Lang Pu, Chao Lin, Biwen Chen, Debiao He |
User-Friendly Public-Key Authenticated Encryption With Keyword Search for Industrial Internet of Things. |
IEEE Internet Things J. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Iftekhar Salam, Wei-Chuen Yau, Raphaël C.-W. Phan, Josef Pieprzyk |
Differential fault attacks on the lightweight authenticated encryption algorithm CLX-128. |
J. Cryptogr. Eng. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Jingwei Lu, Hongbo Li 0004, Jianye Huang, Sha Ma, Man Ho Allen Au, Qiong Huang 0001 |
Certificateless Public Key Authenticated Encryption with Keyword Search Achieving Stronger Security. |
Inf. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Zhenyu Hu, Lunzhi Deng, Yaying Wu, Hongyu Shi, Yan Gao 0008 |
Secure and Efficient Certificateless Searchable Authenticated Encryption Scheme Without Random Oracle for Industrial Internet of Things. |
IEEE Syst. J. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Xiaolin Zhang, Dawu Gu, Tengfei Wang, Yu Huang |
Old School, New Primitive: Toward Scalable PUF-Based Authenticated Encryption Scheme in IoT. |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Xin Cheng 0001, Yixuan Xu, Kefan Wang, Yongqiang Zhang 0006, Bin Li, Zhang Zhang |
Lightweight and flexible hardware implementation of authenticated encryption algorithm SIMON-Galois/Counter Mode. |
Int. J. Circuit Theory Appl. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Kenneth Odoh |
Tortoise: An Authenticated Encryption Scheme. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Yinsong Xu 0001, Wenjie Liu, Wenbin Yu 0002 |
Quantum forgery attacks on COPA, AES-COPA and marble authenticated encryption algorithms. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Pan Yang 0025, Hongbo Li 0004, Jianye Huang, Hao Zhang, Man Ho Allen Au, Qiong Huang 0001 |
Secure channel free public key authenticated encryption with multi-keyword search on healthcare systems. |
Future Gener. Comput. Syst. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Fucai Luo, Haiyan Wang 0009, Changlu Lin, Xingfu Yan |
ABAEKS: Attribute-Based Authenticated Encryption With Keyword Search Over Outsourced Encrypted Data. |
IEEE Trans. Inf. Forensics Secur. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Hongbo Li 0004, Qiong Huang 0001, Jianye Huang, Willy Susilo |
Public-Key Authenticated Encryption With Keyword Search Supporting Constant Trapdoor Generation and Fast Search. |
IEEE Trans. Inf. Forensics Secur. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Cuiran Li, Jixuan Wu, Zepeng Zhang, Anqi Lv |
Energy-harvesting Q-learning secure routing algorithm with authenticated-encryption for WSN. |
ICT Express |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Yusuke Naito 0001, Yu Sasaki, Takeshi Sugawara 0001 |
MMM: Authenticated Encryption with Minimum Secret State for Masking. |
IACR Trans. Cryptogr. Hardw. Embed. Syst. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Pascal Bemmann, Sebastian Berndt 0001, Denis Diemert, Thomas Eisenbarth 0001, Tibor Jager |
Subversion-Resilient Authenticated Encryption without Random Oracles. |
IACR Cryptol. ePrint Arch. |
2023 |
DBLP BibTeX RDF |
|
18 | Shashank Agrawal, Shweta Agrawal, Manoj Prabhakaran 0001, Rajeev Raghunath, Jayesh Singla |
CASE: A New Frontier in Public-Key Authenticated Encryption. |
IACR Cryptol. ePrint Arch. |
2023 |
DBLP BibTeX RDF |
|
18 | Joan Daemen, Silvia Mella, Gilles Van Assche |
Committing authenticated encryption based on SHAKE. |
IACR Cryptol. ePrint Arch. |
2023 |
DBLP BibTeX RDF |
|