Amanote Research
Register
Sign In
Discover open access scientific publications
Search, annotate, share and cite publications
Publications by Anja Lehmann
Delayed-Key Message Authentication for Streams
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Related publications
A Tight Bound for Exhaustive Key Search Attacks Against Message Authentication Codes
RAIRO - Theoretical Informatics and Applications
Mathematics
Computer Science Applications
Software
Authentication Time of IEEE 802.15.4 With Multiple-Key Protocol Using Distributed Message Authentication Code Algorithm
Research Journal of Information Technology
Computer Science
Message Authentication Code Based Secure Group Key Management Protocol for Mobile Ad Hoc Networks
Journal of Computer Science
Computer Networks
Software
Artificial Intelligence
Communications
Assessment Simulation Model for Uncoupled Message Authentication
Efficient Parallel-Pipelined GHASH for Message Authentication
Secret Key Transaction Authentication for DNS (TSIG)
Anonymous Group Message Authentication Protocol for LTE-based V2X Communications
Internet Technology Letters
Key Minimal Authentication Systems for Unconditional Secrecy
Short Message (Service) as Key for Steganography
Research Journal of Information Technology
Computer Science