Results 181 to 190 of about 94,502 (210)
Some of the next articles are maybe not open access.
Efficient beyond-birthday-bound secure authenticated encryption modes
Science China Information Sciences, 2018Ping Zhang, Honggang Hu, Peng Wang
openaire +1 more source
Journal of Computer Virology and Hacking Techniques, 2023
Alexey Kurochkin, D. Fomin
semanticscholar +1 more source
Alexey Kurochkin, D. Fomin
semanticscholar +1 more source
Beyond-birthday security for permutation-based Feistel networks
Designs, Codes and Cryptography, 2021Chun Guo, Guoyan Zhang
semanticscholar +1 more source
Beyond-Birthday-Bound Security with HCTR2: Cascaded Construction and Tweak-Based Key Derivation
International Conference on the Theory and Application of Cryptology and Information SecurityYu Long Chen +5 more
semanticscholar +1 more source
Oncologic emergencies and urgencies: A comprehensive review
Ca-A Cancer Journal for Clinicians, 2022Bonnie Gould Rothberg +2 more
exaly
Climate change impacts on plant pathogens, food security and paths forward
Nature Reviews Microbiology, 2023Brajesh K Singh +2 more
exaly
Using an Error-Correction Code for Fast, Beyond-Birthday-Bound Authentication
The Cryptographer's Track at RSA Conference, 2015Yusi Zhang
semanticscholar +1 more source

