Your Location:
Home >
Browse articles >
Survey of design and security evaluation of authenticated encryption algorithms in the CAESAR competition
Special Issue on Cyberspace Security | Updated:2022-05-19
    • Survey of design and security evaluation of authenticated encryption algorithms in the CAESAR competition

      Enhanced Publication
    • CAESAR竞赛认证加密算法设计分析与安全性评估进展
    • Frontiers of Information Technology & Electronic Engineering   Vol. 19, Issue 12, Pages: 1475-1499(2018)
    • DOI:10.1631/FITEE.1800576    

      CLC: TP309
    • Published:2018-12

      Received:17 September 2018

      Revised:17 December 2018

    Scan QR Code

  • FAN ZHANG, ZI-YUAN LIANG, BO-LIN YANG, et al. Survey of design and security evaluation of authenticated encryption algorithms in the CAESAR competition. [J]. Frontiers of information technology & electronic engineering, 2018, 19(12): 1475-1499. DOI: 10.1631/FITEE.1800576.

  •  
  •  

0

Views

8

Downloads

3

CSCD

>
Alert me when the article has been cited
Submit
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

BORON: an ultra-lightweight and low power encryption design for pervasive computing

Related Author

Gaurav BANSOD
Narayan PISHAROTY
Abhijit PATIL

Related Institution

Pune Institute of Computer Technology, Pune
Glocal University, Saharanpur
Symbiosis Institute of Technology, Pune
0