Amanote Research
Register
Sign In
Discover open access scientific publications
Search, annotate, share and cite publications
Publications by Jee Hea An
Concealment and Its Applications to Authenticated Encryption
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
On the Security of Joint Signature and Encryption
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Related publications
Concealment and Its Applications to Authenticated Encryption
Information Security and Cryptography
Authenticated On-Line Encryption
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Protecting FPGA Bitstreams Using Authenticated Encryption
ASC-1: An Authenticated Encryption Stream Cipher
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions With Application to TLS
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Parallelizable Rate-1 Authenticated Encryption From Pseudorandom Functions
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Low Area and Low Power Implementation for Competition for Authenticated Encryption, Security, Applicability, and Robustness Authenticated Ciphers
Journal of Low Power Electronics
Electronic Engineering
Electrical
Sponges Resist Leakage: The Case of Authenticated Encryption
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Provable-Security Analysis of Authenticated Encryption in Kerberos
IET Information Security
Computer Networks
Software
Information Systems
Communications