Power optimization for universal hash function data path using divide-and-concatenate technique
CODES+ISSS '05 Proceedings of the 3rd IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesis
Improved security analysis of XEX and LRW modes
SAC'06 Proceedings of the 13th international conference on Selected areas in cryptography
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
How to thwart birthday attacks against MACs via small randomness
FSE'10 Proceedings of the 17th international conference on Fast software encryption
Combining message encryption and authentication
Annales UMCS, Informatica - Cryptography and data protection
WEWoRC'11 Proceedings of the 4th Western European conference on Research in Cryptology
On security of universal hash function based multiple authentication
ICICS'12 Proceedings of the 14th international conference on Information and Communications Security
Hi-index | 0.00 |