Author of the publication

The MARVIN message authentication code and the LETTERSOUP authenticated encryption scheme.

, , , , and . Secur. Commun. Networks, 2 (2): 165-180 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Classifying Security Threats in Cloud Networking., , , , , and . CLOSER, page 214-220. SciTePress, (2015)An architecture for P2P locality in managed networks using hierarchical trackers., , , , and . CNSM, page 206-213. IEEE, (2010)A quantitative analysis of current security concerns and solutions for cloud computing., , , , , , and . J. Cloud Comput., (2012)Faster Key Compression for Isogeny-Based Cryptosystems., , , , and . IEEE Trans. Computers, 68 (5): 688-701 (2019)Lyra2: Efficient Password Hashing with High Security against Time-Memory Trade-Offs., , , and . IEEE Trans. Computers, 65 (10): 3096-3108 (2016)Mobile health in emerging countries: A survey of research initiatives in Brazil., , , , , , , , , and . Int. J. Medical Informatics, 82 (5): 283-298 (2013)Amazon Biobank: Assessing the Implementation of a Blockchain-Based Genomic Database., , , , and . IEEE Access, (2024)Benchmarking the Security Protocol and Data Model (SPDM) for component authentication., , and . CoRR, (2023)Securing hard drives with the Security Protocol and Data Model (SPDM)., , and . ISVLSI, page 446-447. IEEE, (2022)z-OTS: a one-time hash-based digital signaturescheme with fast verification., and . IACR Cryptol. ePrint Arch., (2021)