A carregar...
New forgery attack on the authenticated cipher SCREAM and iSCREAM
Authentication encryption algorithms have been widely used in networks security system since these al-gorithms can efficiently provide both privacy and integrity measurement for data transmission. Recently, authentica-tion encryption algorithms have received attentions extensively since the event of...
Na minha lista:
Main Authors: | , |
---|---|
Formato: | Artigo |
Idioma: | Inglês |
Publicado em: |
POSTS&TELECOM PRESS Co., LTD
2016-01-01
|
Colecção: | 网络与信息安全学报 |
Assuntos: | |
Acesso em linha: | http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2016.00012 |
Tags: |
Adicionar Tag
Sem tags, seja o primeiro a adicionar uma tag!
|