Login / Signup
Optimised the differential trail of the authenticated encryption algorithm Tiaoxin-346.
Wenying Zhang
Zhen Xiao
Mengzhu Li
Published in:
Int. J. High Perform. Comput. Netw. (2017)
Keyphrases
</>
encryption algorithm
encryption algorithms
security analysis
pseudorandom
authentication scheme
data encryption
high security
chaotic maps
digital content
encryption scheme
s box
access control
ciphertext
user authentication
information systems
security requirements