Jakimoski, 2006
| Publication | Publication Date | Title |
|---|---|---|
| Buttyan et al. | Security and cooperation in wireless networks: thwarting malicious and selfish behavior in the age of ubiquitous computing | |
| US6950517B2 (en) | Efficient encryption and authentication for data processing systems | |
| Preneel | Analysis and design of cryptographic hash functions | |
| US6948067B2 (en) | Efficient encryption and authentication for data processing systems | |
| US7305084B2 (en) | Fast encryption and authentication for data processing systems | |
| US6973187B2 (en) | Block encryption method and schemes for data confidentiality and integrity protection | |
| Wu et al. | Leaked-state-forgery attack against the authenticated encryption algorithm ALE | |
| US7254233B2 (en) | Fast encryption and authentication for data processing systems | |
| Jakobsen et al. | A practical cryptanalysis of the Telegram messaging protocol | |
| Jakimoski et al. | ASC-1: An authenticated encryption stream cipher | |
| Paar et al. | Message authentication codes (MACs) | |
| Noura et al. | A single-pass and one-round message authentication encryption for limited IoT devices | |
| Eskandarian | Abuse Reporting for {Metadata-Hiding} Communication Based on Secret Sharing | |
| US11838424B2 (en) | Authenticated encryption apparatus with initialization-vector misuse resistance and method therefor | |
| Simplicio et al. | Revisiting the security of the ALRED Design and Two of Its Variants: Marvin and LetterSoup | |
| Rogobete et al. | Hashing and Message Authentication Code Implementation. An Embedded Approach. | |
| Preneel et al. | Cryptographic hash functions: an overview | |
| Jakimoski | Some notes on the security of the timed efficient stream loss-tolerant authentication scheme | |
| IL159804A (en) | Method for authenticating a message | |
| Kim | Combined differential, linear and related-key attacks on block ciphers and MAC algorithms | |
| Wu | Fundamentals of cryptography | |
| Bard | Modes of encryption secure against blockwise-adaptive chosen-plaintext attack | |
| Soni et al. | Comparative Analysis of Cryptographic Algorithms in Computer Network | |
| Emami | Security analysis of cryptographic algorithms | |
| Lam et al. | Cryptography |