-
1
IAESR: IoT-oriented authenticated encryption based on iShadow round function
Published 2025-06-01Subjects: “…Authenticated encryption…”
Get full text
Article -
2
New cryptanalysis of the authenticated cipher model JAMBU
Published 2017-07-01Subjects: Get full text
Article -
3
Committing AE from Sponges
Published 2024-12-01Subjects: “…Authenticated Encryption…”
Get full text
Article -
4
Cymric: Short-tailed but Mighty
Published 2025-06-01Subjects: “…Authenticated Encryption…”
Get full text
Article -
5
AETHER: An Ultra-High Throughput and Low Energy Authenticated Encryption Scheme
Published 2025-03-01Subjects: “…Authenticated encryption…”
Get full text
Article -
6
Key committing attack on Tiaoxin-346 algorithm
Published 2025-04-01Subjects: “…Authenticated encryption…”
Get full text
Article -
7
Improved related‐tweakey rectangle attacks on round‐reduced Deoxys‐BC
Published 2023-05-01Subjects: “…authenticated encryption…”
Get full text
Article -
8
Nonce‐misuse resilience of Romulus‐N and GIFT‐COFB
Published 2023-05-01Subjects: “…authenticated encryption…”
Get full text
Article -
9
Committing Wide Encryption Mode with Minimum Ciphertext Expansion
Published 2025-03-01Subjects: Get full text
Article -
10
Security Analysis of Relay in LTE-Advanced
Published 2013-09-01Subjects: “…wireless communication;security;relay;authentication;encryption…”
Get full text
Article