Sign in

Architecture Optimization and Performance Comparison of Nonce-Misuse-Resistant Authenticated Encryption Algorithms.

Sandhya KoteshwaraAmitabh DasKeshab K. Parhi
Published in: IEEE Trans. Very Large Scale Integr. Syst. (2019)
Keyphrases
  • encryption algorithms
  • software architecture
  • data encryption standard
  • anomaly detection
  • authentication scheme