A carregar...

New forgery attack on the authenticated cipher SCREAM and iSCREAM

Authentication encryption algorithms have been widely used in networks security system since these al-gorithms can efficiently provide both privacy and integrity measurement for data transmission. Recently, authentica-tion encryption algorithms have received attentions extensively since the event of...

ver descrição completa

Na minha lista:
Detalhes bibliográficos
Main Authors: Yu-dan TIAN, Yong-zhuang WE
Formato: Artigo
Idioma:Inglês
Publicado em: POSTS&TELECOM PRESS Co., LTD 2016-01-01
Colecção:网络与信息安全学报
Assuntos:
Acesso em linha:http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2016.00012
Tags: Adicionar Tag
Sem tags, seja o primeiro a adicionar uma tag!