Login / Signup
Attacks on the Authenticated Encryption Mode of Operation PAE.
Debrup Chakraborty
Mridul Nandi
Published in:
IEEE Trans. Inf. Theory (2015)
Keyphrases
</>
key exchange
countermeasures
cryptographic protocols
modular exponentiation
stream cipher
advanced encryption standard
watermarking algorithm
watermarking technique
security properties
cryptographic algorithms
encryption scheme
security protocols
encryption algorithms
encryption decryption