Login / Signup
Survey of design and security evaluation of authenticated encryption algorithms in the CAESAR competition.
Fan Zhang
Ziyuan Liang
Bolin Yang
Xinjie Zhao
Shize Guo
Kui Ren
Published in:
Frontiers Inf. Technol. Electron. Eng. (2018)
Keyphrases
</>
encryption algorithms
image encryption
data encryption standard
low cost
intrusion detection
data integrity
authentication scheme
key exchange