Cited By
View all- (2024)Block Cipher Modes of Operation for Authentication and ConfidentialityCryptography10.1002/9781394207510.ch9(281-313)Online publication date: 16-Feb-2024
- (2024)Introduction to Security Analysis of Block CiphersCryptography10.1002/9781394207510.ch10(314-337)Online publication date: 16-Feb-2024
- Zhang P(2023)GCM-SIV1.5: Optimal Tradeoff between GCM-SIV1 and GCM-SIV2Entropy10.3390/e2501010725:1(107)Online publication date: 4-Jan-2023
- Show More Cited By




