Amanote Research
Register
Sign In
Discover open access scientific publications
Search, annotate, share and cite publications
Publications by A. Boldyreva
Provable-Security Analysis of Authenticated Encryption in Kerberos
IET Information Security
Computer Networks
Software
Information Systems
Communications
Related publications
Authenticated On-Line Encryption
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Low Area and Low Power Implementation for Competition for Authenticated Encryption, Security, Applicability, and Robustness Authenticated Ciphers
Journal of Low Power Electronics
Electronic Engineering
Electrical
Protecting FPGA Bitstreams Using Authenticated Encryption
Concealment and Its Applications to Authenticated Encryption
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
ASC-1: An Authenticated Encryption Stream Cipher
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Concealment and Its Applications to Authenticated Encryption
Information Security and Cryptography
Sponges Resist Leakage: The Case of Authenticated Encryption
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Parallelizable Rate-1 Authenticated Encryption From Pseudorandom Functions
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Towards Provable Security for Ubiquitous Applications
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science