Browsing by Subject "tag"

Sort by: Order: Results:

  • Mamidi, Upendarreddy (2016-03-04)
    Traditionally, authenticated encryption was achieved by using two seperate algorithms for encryption and authentication. Recently, modes that combine encryption and authentication together are being proposed. This feature ...