
Authenticated Encryption Schemes Without Using Hash and Redundancy Functions
ZHANG Chuan-rong, YIN Zhong-hai, XIAO Guo-zhen
ACTA ELECTRONICA SINICA ›› 2006, Vol. 34 ›› Issue (5) : 874-877.
Authenticated Encryption Schemes Without Using Hash and Redundancy Functions
{{custom_ref.label}} |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
/
〈 |
|
〉 |