Results 181 to 190 of about 94,493 (210)
Some of the next articles are maybe not open access.
Beyond-Birthday-Bound Security with HCTR2: Cascaded Construction and Tweak-Based Key Derivation
International Conference on the Theory and Application of Cryptology and Information SecurityYu Long Chen +5 more
semanticscholar +1 more source
Using an Error-Correction Code for Fast, Beyond-Birthday-Bound Authentication
The Cryptographer's Track at RSA Conference, 2015Yusi Zhang
semanticscholar +1 more source
Nano-enabled pesticides for sustainable agriculture and global food security
Nature Nanotechnology, 2022Deng-jun Wang, Navid B Saleh, Kay T Ho
exaly
Minimizing beyond-birthday-bound secure permutation-based pseudorandom function
Discrete MathematicsPing Zhang +4 more
openaire +1 more source
Parallelizable MACs Based on the Sum of PRPs with Security Beyond the Birthday Bound
IACR Cryptology ePrint Archive, 2019Alexander Moch, Eik List
semanticscholar +1 more source
Circularly polarized lanthanide luminescence for advanced security inks
Nature Reviews Chemistry, 2020Lewis Edward MacKenzie, Robert Pal
exaly
Authenticated Encryption Mode for Beyond the Birthday Bound Security
International Conference on Cryptology in Africa, 2008Tetsu Iwata
semanticscholar +1 more source
A Survey on Security Aspects for 3GPP 5G Networks
IEEE Communications Surveys and Tutorials, 2020Jin Cao, Maod, Hui Li
exaly

