Cited By
View all- Jha ANandi M(2018)On rate-1 and beyond-the-birthday bound secure online ciphers using tweakable block ciphersCryptography and Communications10.1007/s12095-017-0275-010:5(731-753)Online publication date: 1-Sep-2018
- Imamura KMinematsu KIwata T(2018)Integrity analysis of authenticated encryption based on stream ciphersInternational Journal of Information Security10.1007/s10207-017-0378-917:5(493-511)Online publication date: 1-Oct-2018
- Ivanchykhin DIgnatchenko SLemire D(2017)Regular and almost universal hashingSoftware—Practice & Experience10.1002/spe.246147:10(1299-1323)Online publication date: 1-Oct-2017
- Show More Cited By