@dblp

Beyond 2 c/2 Security in Sponge-Based Authenticated Encryption Modes.

, , and . ASIACRYPT (1), volume 8873 of Lecture Notes in Computer Science, page 85-104. Springer, (2014)

Links and resources

Tags