Options
Exploiting the leakage: Analysis of some authenticated encryption schemes
Journal
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Date Issued
2016-01-01
Author(s)
Chang, Donghoon
Chauhan, Amit Kumar
Gupta, Naina
Jati, Arpan
Sanadhya, Somitra Kumar
Subjects