@dblp

Beyond 2 c/2 Security in Sponge-Based Authenticated Encryption Modes.

, , und . ASIACRYPT (1), Volume 8873 von Lecture Notes in Computer Science, Seite 85-104. Springer, (2014)

Links und Ressourcen

Tags