Login / Signup

A new authenticated encryption technique for handling long ciphertexts in memory constrained devices.

Megha AgrawalDonghoon ChangSomitra Kumar Sanadhya
Published in: Int. J. Appl. Cryptogr. (2017)
Keyphrases