Login / Signup

Cryptanalysis of Tseng et al.'s authenticated encryption schemes.

Qi XieXiuyuan Yu
Published in: Appl. Math. Comput. (2004)
Keyphrases