Concealment and Its Applications to Authenticated Encryption

Information Security and Cryptography
doi 10.1007/978-3-540-89411-7_8
Full Text
Abstract

Available in full text

Date
Authors
Publisher

Springer Berlin Heidelberg