Sign in

Survey of design and security evaluation of authenticated encryption algorithms in the CAESAR competition.

Fan ZhangZiyuan LiangBolin YangXinjie ZhaoShize GuoKui Ren
Published in: Frontiers Inf. Technol. Electron. Eng. (2018)
Keyphrases
  • encryption algorithms
  • image encryption
  • data encryption standard
  • low cost
  • intrusion detection
  • data integrity
  • authentication scheme
  • key exchange