Search dblp for Publications

export results for "message encryption"

 download as .bib file

@article{DBLP:journals/mta/FanfakhNC24,
  author       = {Ahmed Fanfakh and
                  Hassan Noura and
                  Rapha{\"{e}}l Couturier},
  title        = {Simultaneous encryption and authentication of messages over GPUs},
  journal      = {Multim. Tools Appl.},
  volume       = {83},
  number       = {2},
  pages        = {4757--4789},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11042-023-15451-5},
  doi          = {10.1007/S11042-023-15451-5},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mta/FanfakhNC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/LinCN24,
  author       = {Shi Lin and
                  Li Cui and
                  Ke Niu},
  title        = {End-to-End Encrypted Message Distribution System for the Internet
                  of Things Based on Conditional Proxy Re-Encryption},
  journal      = {Sensors},
  volume       = {24},
  number       = {2},
  pages        = {438},
  year         = {2024},
  url          = {https://doi.org/10.3390/s24020438},
  doi          = {10.3390/S24020438},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/LinCN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/YangFW24,
  title        = {Retraction Note: Encryption scheme with mixed homomorphic signature
                  based on message authentication for digital image},
  journal      = {J. Supercomput.},
  volume       = {80},
  number       = {7},
  pages        = {10192},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11227-024-05981-6},
  doi          = {10.1007/S11227-024-05981-6},
  timestamp    = {Mon, 29 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/YangFW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/dnb/Moch23,
  author       = {Alexander Moch},
  title        = {Provable security for lightweight message authentication and encryption},
  school       = {University of Mannheim, Germany},
  year         = {2023},
  url          = {https://madoc.bib.uni-mannheim.de/65508/},
  urn          = {urn:nbn:de:bsz:180-madoc-655089},
  timestamp    = {Fri, 02 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/phd/dnb/Moch23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/AcharyaSM23,
  author       = {Kamalesh Acharya and
                  Amit Kumar Singh and
                  Sourav Mukhopadhyay},
  title        = {Constructions of broadcast encryption with personalized messages from
                  bilinear map},
  journal      = {Comput. Commun.},
  volume       = {209},
  pages        = {91--101},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.comcom.2023.06.023},
  doi          = {10.1016/J.COMCOM.2023.06.023},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/AcharyaSM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/YaoZ23,
  author       = {Shuang Yao and
                  Dawei Zhang},
  title        = {{BPRT:} {A} blockchain-based privacy-preserving transaction scheme
                  based on an efficient broadcast encryption with personalized messages},
  journal      = {Trans. Emerg. Telecommun. Technol.},
  volume       = {34},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.1002/ett.4675},
  doi          = {10.1002/ETT.4675},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ett/YaoZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-com/WangHMXH23,
  author       = {Shaoyu Wang and
                  Kaizhi Huang and
                  Keming Ma and
                  Xiaoming Xu and
                  Xiaoyan Hu},
  title        = {A lightweight encryption and message authentication framework for
                  wireless communication},
  journal      = {{IET} Commun.},
  volume       = {17},
  number       = {3},
  pages        = {265--278},
  year         = {2023},
  url          = {https://doi.org/10.1049/cmu2.12535},
  doi          = {10.1049/CMU2.12535},
  timestamp    = {Sat, 19 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-com/WangHMXH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/MasadehAA23,
  author       = {Shadi Rasheed Masadeh and
                  Hamza Abbass Al{-}Sewadi and
                  Mohammed Abbas Fadhil Al{-}Husainy},
  title        = {A message encryption scheme inspired by Sudoku puzzle},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {21},
  number       = {3/4},
  pages        = {399--413},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.132739},
  doi          = {10.1504/IJICS.2023.132739},
  timestamp    = {Wed, 13 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/MasadehAA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/remotesensing/LiuWZ23,
  author       = {Sheng Liu and
                  Di Wu and
                  Lanyong Zhang},
  title        = {{CGAN} BeiDou Satellite Short-Message-Encryption Scheme Using Ship
                  {PVT}},
  journal      = {Remote. Sens.},
  volume       = {15},
  number       = {1},
  pages        = {171},
  year         = {2023},
  url          = {https://doi.org/10.3390/rs15010171},
  doi          = {10.3390/RS15010171},
  timestamp    = {Thu, 04 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/remotesensing/LiuWZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdatasec/JainMV23,
  author       = {Somil Jain and
                  Cristina Hava Muntean and
                  Rohit Verma},
  title        = {Honey2Fish - {A} Hybrid Encryption Approach for Improved Password
                  and Message Security},
  booktitle    = {9th Intl Conference on Big Data Security on Cloud, BigDataSecurity,
                  {IEEE} Intl Conference on High Performance and Smart Computing, {HPSC}
                  and {IEEE} Intl Conference on Intelligent Data and Security {IDS}
                  2023, New York, NY, USA, May 6-8, 2023},
  pages        = {198--203},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/BigDataSecurity-HPSC-IDS58521.2023.00042},
  doi          = {10.1109/BIGDATASECURITY-HPSC-IDS58521.2023.00042},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bigdatasec/JainMV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/LyuL23,
  author       = {You Lyu and
                  Shengli Liu},
  editor       = {Gene Tsudik and
                  Mauro Conti and
                  Kaitai Liang and
                  Georgios Smaragdakis},
  title        = {Two-Message Authenticated Key Exchange from Public-Key Encryption},
  booktitle    = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research
                  in Computer Security, The Hague, The Netherlands, September 25-29,
                  2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14344},
  pages        = {414--434},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-50594-2\_21},
  doi          = {10.1007/978-3-031-50594-2\_21},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/LyuL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ol2a/ValenteBCC023,
  author       = {David Valente and
                  Thadeu Brito and
                  M{\'{a}}rcio Correia and
                  Jos{\'{e}} Augusto Carvalho and
                  Jos{\'{e}} Lima},
  editor       = {Ana I. Pereira and
                  Armando B. Mendes and
                  Florbela P. Fernandes and
                  Maria F. Pacheco and
                  Jo{\~{a}}o Paulo Coelho and
                  Jos{\'{e}} Lima},
  title        = {Image Transfer over {MQTT} in IoT: Message Segmentation and Encryption
                  for Remote Indicator Panels},
  booktitle    = {Optimization, Learning Algorithms and Applications - Third International
                  Conference, {OL2A} 2023, Ponta Delgada, Portugal, September 27-29,
                  2023, Revised Selected Papers, Part {I}},
  series       = {Communications in Computer and Information Science},
  volume       = {1981},
  pages        = {360--373},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-53025-8\_25},
  doi          = {10.1007/978-3-031-53025-8\_25},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ol2a/ValenteBCC023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/Ka23,
  author       = {Ahmad Khoureich Ka},
  editor       = {Mark Manulis and
                  Diana Maimut and
                  George Teseleanu},
  title        = {M-Sel: {A} Message Selection Functional Encryption from Simple Tools},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 16th International Conference, SecITC 2023, Bucharest, Romania,
                  November 23-24, 2023, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14534},
  pages        = {79--96},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-52947-4\_7},
  doi          = {10.1007/978-3-031-52947-4\_7},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secitc/Ka23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LyuL23,
  author       = {You Lyu and
                  Shengli Liu},
  title        = {Two-Message Authenticated Key Exchange from Public-Key Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {706},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/706},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LyuL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/Shanableh22,
  author       = {Tamer Shanableh},
  title        = {{HEVC} Video Encryption With High Capacity Message Embedding by Altering
                  Picture Reference Indices and Motion Vectors},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {22320--22329},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3152548},
  doi          = {10.1109/ACCESS.2022.3152548},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/Shanableh22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entropy/AbuTahaAA22,
  author       = {Mohammed AbuTaha and
                  Islam Amar and
                  Salman AlQahtani},
  title        = {Parallel and Practical Approach of Efficient Image Chaotic Encryption
                  Based on Message Passing Interface {(MPI)}},
  journal      = {Entropy},
  volume       = {24},
  number       = {4},
  pages        = {566},
  year         = {2022},
  url          = {https://doi.org/10.3390/e24040566},
  doi          = {10.3390/E24040566},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entropy/AbuTahaAA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/NouraSCC22,
  author       = {Hassan N. Noura and
                  Ola Salman and
                  Rapha{\"{e}}l Couturier and
                  Ali Chehab},
  title        = {A Single-Pass and One-Round Message Authentication Encryption for
                  Limited IoT Devices},
  journal      = {{IEEE} Internet Things J.},
  volume       = {9},
  number       = {18},
  pages        = {17885--17900},
  year         = {2022},
  url          = {https://doi.org/10.1109/JIOT.2022.3161192},
  doi          = {10.1109/JIOT.2022.3161192},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/NouraSCC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/XiongWZZHK22,
  author       = {Hu Xiong and
                  Lili Wang and
                  Zhida Zhou and
                  Zetong Zhao and
                  Xin Huang and
                  Saru Kumari},
  title        = {Burn After Reading: Adaptively Secure Puncturable Identity-Based Proxy
                  Re-Encryption Scheme for Securing Group Message},
  journal      = {{IEEE} Internet Things J.},
  volume       = {9},
  number       = {13},
  pages        = {11248--11260},
  year         = {2022},
  url          = {https://doi.org/10.1109/JIOT.2021.3126230},
  doi          = {10.1109/JIOT.2021.3126230},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/XiongWZZHK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/LiuYSTCL22,
  author       = {Xueqiao Liu and
                  Guomin Yang and
                  Willy Susilo and
                  Joseph Tonien and
                  Rongmao Chen and
                  Xixiang Lv},
  title        = {Message-Locked Searchable Encryption: {A} New Versatile Tool for Secure
                  Cloud Storage},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {15},
  number       = {3},
  pages        = {1664--1677},
  year         = {2022},
  url          = {https://doi.org/10.1109/TSC.2020.3006532},
  doi          = {10.1109/TSC.2020.3006532},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsc/LiuYSTCL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aiccsa/AggarwalS22,
  author       = {Akshit Aggarwal and
                  Srinibas Swain},
  title        = {Blind Two Party {ECDSA} Signing Based Homomorphic Encryption over
                  Message Passing},
  booktitle    = {19th {IEEE/ACS} International Conference on Computer Systems and Applications,
                  {AICCSA} 2022, Abu Dhabi, United Arab Emirates, December 5-8, 2022},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/AICCSA56895.2022.10017657},
  doi          = {10.1109/AICCSA56895.2022.10017657},
  timestamp    = {Thu, 26 Jan 2023 11:35:09 +0100},
  biburl       = {https://dblp.org/rec/conf/aiccsa/AggarwalS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/CampanelliDKKN22,
  author       = {Matteo Campanelli and
                  Bernardo David and
                  Hamidreza Khoshakhlagh and
                  Anders Konring and
                  Jesper Buus Nielsen},
  editor       = {Shweta Agrawal and
                  Dongdai Lin},
  title        = {Encryption to the Future - {A} Paradigm for Sending Secret Messages
                  to Future (Anonymous) Committees},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13793},
  pages        = {151--180},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22969-5\_6},
  doi          = {10.1007/978-3-031-22969-5\_6},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/CampanelliDKKN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdf2c/LiuYWX22,
  author       = {Qiuming Liu and
                  Zhexin Yao and
                  Zhen Wu and
                  Zeyao Xu},
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Akatyev Nikolay and
                  George Markowsky and
                  Daryl Johnson},
  title        = {Attribute-Based Proxy Re-encryption with Privacy Protection for Message
                  Dissemination in {VANET}},
  booktitle    = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference,
                  {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {508},
  pages        = {387--402},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-36574-4\_23},
  doi          = {10.1007/978-3-031-36574-4\_23},
  timestamp    = {Mon, 17 Jul 2023 16:28:01 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/LiuYWX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispacs/KazmiQHN22,
  author       = {Syed Hussain Ali Kazmi and
                  Faizan Qamar and
                  Rosilah Hassan and
                  Kashif Nisar},
  title        = {Improved QoS in Internet of Things (IoTs) through Short Messages Encryption
                  Scheme for Wireless Sensor Communication},
  booktitle    = {International Symposium on Intelligent Signal Processing and Communication
                  Systems, {ISPACS} 2022, Penang, Malaysia, November 22-25, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ISPACS57703.2022.10082815},
  doi          = {10.1109/ISPACS57703.2022.10082815},
  timestamp    = {Sat, 22 Apr 2023 17:02:05 +0200},
  biburl       = {https://dblp.org/rec/conf/ispacs/KazmiQHN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/WuJ022,
  author       = {Shaoqiang Wu and
                  Chunfu Jia and
                  Ding Wang},
  editor       = {Weizhi Meng and
                  Simone Fischer{-}H{\"{u}}bner and
                  Christian Damsgaard Jensen},
  title        = {{UP-MLE:} Efficient and Practical Updatable Block-Level Message-Locked
                  Encryption Scheme Based on Update Properties},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 37th {IFIP} {TC} 11
                  International Conference, {SEC} 2022, Copenhagen, Denmark, June 13-15,
                  2022, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {648},
  pages        = {251--269},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-06975-8\_15},
  doi          = {10.1007/978-3-031-06975-8\_15},
  timestamp    = {Tue, 21 Jun 2022 15:17:37 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/WuJ022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wasa/XuCHCG22,
  author       = {Shiyuan Xu and
                  Xue Chen and
                  Yunhua He and
                  Yibo Cao and
                  Shang Gao},
  editor       = {Lei Wang and
                  Michael Segal and
                  Jenhui Chen and
                  Tie Qiu},
  title        = {{VMT:} Secure VANETs Message Transmission Scheme with Encryption and
                  Blockchain},
  booktitle    = {Wireless Algorithms, Systems, and Applications - 17th International
                  Conference, {WASA} 2022, Dalian, China, November 24-26, 2022, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13471},
  pages        = {244--257},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-19208-1\_21},
  doi          = {10.1007/978-3-031-19208-1\_21},
  timestamp    = {Tue, 14 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wasa/XuCHCG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computers/MarjaiLK21,
  author       = {P{\'{e}}ter Marjai and
                  P{\'{e}}ter Lehotay{-}K{\'{e}}ry and
                  Attila Kiss},
  title        = {The Use of Template Miners and Encryption in Log Message Compression},
  journal      = {Comput.},
  volume       = {10},
  number       = {7},
  pages        = {83},
  year         = {2021},
  url          = {https://doi.org/10.3390/computers10070083},
  doi          = {10.3390/COMPUTERS10070083},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computers/MarjaiLK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhaoC21,
  author       = {Yongjun Zhao and
                  Sherman S. M. Chow},
  title        = {Updatable Block-Level Message-Locked Encryption},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {18},
  number       = {4},
  pages        = {1620--1631},
  year         = {2021},
  url          = {https://doi.org/10.1109/TDSC.2019.2922403},
  doi          = {10.1109/TDSC.2019.2922403},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhaoC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aicsp/KahlaBLKA21,
  author       = {Mohammed Elhabib Kahla and
                  Mounir Beggas and
                  Abdelkader Laouid and
                  Mostefa Kara and
                  Muath AlShaikh},
  title        = {Asymmetric Image Encryption Based on Twin Message Fusion},
  booktitle    = {2021 International Conference on Artificial Intelligence for Cyber
                  Security Systems and Privacy (AI-CSP), El Oued, Algeria, November
                  20-21, 2021},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/AI-CSP52968.2021.9671161},
  doi          = {10.1109/AI-CSP52968.2021.9671161},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aicsp/KahlaBLKA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/PanCZS21,
  author       = {Jing Pan and
                  Xiaofeng Chen and
                  Fangguo Zhang and
                  Willy Susilo},
  editor       = {Mehdi Tibouchi and
                  Huaxiong Wang},
  title        = {Lattice-Based Group Encryption with Full Dynamicity and Message Filtering
                  Policy},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 6-10, 2021, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13093},
  pages        = {156--186},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92068-5\_6},
  doi          = {10.1007/978-3-030-92068-5\_6},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/PanCZS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/WuTWSM21,
  author       = {Suzhen Wu and
                  Zhanhong Tu and
                  Zuocheng Wang and
                  Zhirong Shen and
                  Bo Mao},
  title        = {When Delta Sync Meets Message-Locked Encryption: a Feature-based Delta
                  Sync Scheme for Encrypted Cloud Storage},
  booktitle    = {41st {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2021, Washington DC, USA, July 7-10, 2021},
  pages        = {337--347},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICDCS51616.2021.00040},
  doi          = {10.1109/ICDCS51616.2021.00040},
  timestamp    = {Wed, 13 Oct 2021 15:47:30 +0200},
  biburl       = {https://dblp.org/rec/conf/icdcs/WuTWSM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/NguyenSSWXZ21,
  author       = {Khoa Nguyen and
                  Reihaneh Safavi{-}Naini and
                  Willy Susilo and
                  Huaxiong Wang and
                  Yanhong Xu and
                  Neng Zeng},
  editor       = {Juan A. Garay},
  title        = {Group Encryption: Full Dynamicity, Message Filtering and Code-Based
                  Instantiation},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12711},
  pages        = {678--708},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75248-4\_24},
  doi          = {10.1007/978-3-030-75248-4\_24},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/NguyenSSWXZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Akgul0DM21,
  author       = {Omer Akgul and
                  Wei Bai and
                  Shruti Das and
                  Michelle L. Mazurek},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Evaluating In-Workflow Messages for Improving Mental Models of End-to-End
                  Encryption},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {447--464},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/akgul},
  timestamp    = {Mon, 20 Nov 2023 08:57:49 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/Akgul0DM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2110-07009,
  author       = {Luke A. Bauer and
                  James K. Howes IV and
                  Sam A. Markelon and
                  Vincent Bindschaedler and
                  Thomas Shrimpton},
  title        = {Covert Message Passing over Public Internet Platforms Using Model-Based
                  Format-Transforming Encryption},
  journal      = {CoRR},
  volume       = {abs/2110.07009},
  year         = {2021},
  url          = {https://arxiv.org/abs/2110.07009},
  eprinttype    = {arXiv},
  eprint       = {2110.07009},
  timestamp    = {Fri, 22 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2110-07009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CampanelliDKKN21,
  author       = {Matteo Campanelli and
                  Bernardo David and
                  Hamidreza Khoshakhlagh and
                  Anders K. Kristensen and
                  Jesper Buus Nielsen},
  title        = {Encryption to the Future: {A} Paradigm for Sending Secret Messages
                  to Future (Anonymous) Committees},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1423},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1423},
  timestamp    = {Fri, 12 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/CampanelliDKKN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FanSTH21,
  author       = {Chun{-}I Fan and
                  Cheng{-}Han Shie and
                  Yi{-}Fan Tseng and
                  Hui{-}Chun Huang},
  title        = {An Efficient Data Protection Scheme Based on Hierarchical ID-Based
                  Encryption for Message Queueing Telemetry Transport},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1057},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1057},
  timestamp    = {Mon, 06 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FanSTH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NguyenSSWXZ21,
  author       = {Khoa Nguyen and
                  Reihaneh Safavi{-}Naini and
                  Willy Susilo and
                  Huaxiong Wang and
                  Yanhong Xu and
                  Neng Zeng},
  title        = {Group Encryption: Full Dynamicity, Message Filtering and Code-Based
                  Instantiation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {226},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/226},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/NguyenSSWXZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/LingMHLL20,
  author       = {Yunhao Ling and
                  Sha Ma and
                  Qiong Huang and
                  Ximing Li and
                  Yunzhi Ling},
  title        = {Group public key encryption with equality test against offline message
                  recovery attack},
  journal      = {Inf. Sci.},
  volume       = {510},
  pages        = {16--32},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.ins.2019.09.025},
  doi          = {10.1016/J.INS.2019.09.025},
  timestamp    = {Thu, 22 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/LingMHLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jihmsp/Korzhik0FM20,
  author       = {Valery I. Korzhik and
                  Cuong Nguyen and
                  Ivan Fedyanin and
                  Guillermo Morales{-}Luna},
  title        = {Side Attacks on Stegosystems Executing Message Encryption Previous
                  to Embedding},
  journal      = {J. Inf. Hiding Multim. Signal Process.},
  volume       = {11},
  number       = {1},
  pages        = {44--57},
  year         = {2020},
  url          = {http://bit.kuas.edu.tw/\&\#126;jihmsp/2020/vol1/3\_jihmsp-1218.pdf},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jihmsp/Korzhik0FM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/LiangY20,
  author       = {Min Liang and
                  Li Yang},
  title        = {Block encryption of quantum messages},
  journal      = {Quantum Inf. Process.},
  volume       = {19},
  number       = {4},
  pages        = {111},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11128-020-2612-z},
  doi          = {10.1007/S11128-020-2612-Z},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/LiangY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiuZZHL20,
  author       = {Hui Liu and
                  Bo Zhao and
                  Jianwen Zou and
                  Linquan Huang and
                  Yifan Liu},
  title        = {A Lightweight Image Encryption Algorithm Based on Message Passing
                  and Chaotic Map},
  journal      = {Secur. Commun. Networks},
  volume       = {2020},
  pages        = {7151836:1--7151836:12},
  year         = {2020},
  url          = {https://doi.org/10.1155/2020/7151836},
  doi          = {10.1155/2020/7151836},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LiuZZHL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tbc/ChenLZ20,
  author       = {Liqing Chen and
                  Jiguo Li and
                  Yichen Zhang},
  title        = {Anonymous Certificate-Based Broadcast Encryption With Personalized
                  Messages},
  journal      = {{IEEE} Trans. Broadcast.},
  volume       = {66},
  number       = {4},
  pages        = {867--881},
  year         = {2020},
  url          = {https://doi.org/10.1109/TBC.2020.2984974},
  doi          = {10.1109/TBC.2020.2984974},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tbc/ChenLZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/webology/DeviMK20,
  author       = {T. Kirthiga Devi and
                  R. Mohanakrishnan and
                  T. Karthick},
  title        = {Secure Message Broadcasting in {VANET} Using {RSU} based Authentication
                  and Cascade Encryption},
  journal      = {Webology},
  volume       = {17},
  number       = {2},
  pages        = {706--716},
  year         = {2020},
  url          = {https://doi.org/10.14704/web/v17i2/web17062},
  doi          = {10.14704/WEB/V17I2/WEB17062},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/webology/DeviMK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisis-spain/SalazarSFRA20,
  author       = {Jos{\'{e}} Luis Salazar and
                  Jose Saldana and
                  Juli{\'{a}}n Fern{\'{a}}ndez{-}Navajas and
                  Jos{\'{e}} Ru{\'{\i}}z{-}Mas and
                  Guillermo Azuara},
  editor       = {{\'{A}}lvaro Herrero and
                  Carlos Cambra and
                  Daniel Urda and
                  Javier Sedano and
                  H{\'{e}}ctor Quinti{\'{a}}n and
                  Emilio Corchado},
  title        = {Short Message Multichannel Broadcast Encryption},
  booktitle    = {13th International Conference on Computational Intelligence in Security
                  for Information Systems, {CISIS} 2020, Burgos, Spain, September 2020},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {1267},
  pages        = {122--131},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-57805-3\_12},
  doi          = {10.1007/978-3-030-57805-3\_12},
  timestamp    = {Mon, 13 Feb 2023 21:54:28 +0100},
  biburl       = {https://dblp.org/rec/conf/cisis-spain/SalazarSFRA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ficta/GoyalPRRK20,
  author       = {Saloni Goyal and
                  Balie Shalomi Pacholi and
                  B. Ashwath Rao and
                  Shwetha Rai and
                  N. Gopalakrishna Kini},
  editor       = {Vikrant Bhateja and
                  Sheng{-}Lung Peng and
                  Suresh Chandra Satapathy and
                  Yu{-}Dong Zhang},
  title        = {Parallel Message Encryption Through Playfair Cipher Using {CUDA}},
  booktitle    = {Evolution in Computational Intelligence - Frontiers in Intelligent
                  Computing: Theory and Applications {(FICTA} 2020), Volume 1, Karnataka,
                  Surathkal, India, January 4-5, 2020},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {1176},
  pages        = {519--526},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-981-15-5788-0\_50},
  doi          = {10.1007/978-981-15-5788-0\_50},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ficta/GoyalPRRK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-15985,
  author       = {Kunjal Panchal},
  title        = {Differential Privacy and Natural Language Processing to Generate Contextually
                  Similar Decoy Messages in Honey Encryption Scheme},
  journal      = {CoRR},
  volume       = {abs/2010.15985},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.15985},
  eprinttype    = {arXiv},
  eprint       = {2010.15985},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-15985.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Goncharov20,
  author       = {Sergij V. Goncharov},
  title        = {On (impracticality of) transfinite symmetric encryption with keys
                  smaller than messages under {GCH}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {715},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/715},
  timestamp    = {Tue, 30 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Goncharov20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KounavisDDMW20,
  author       = {Michael E. Kounavis and
                  David Durham and
                  Sergej Deutsch and
                  Krystian Matusiewicz and
                  David Wheeler},
  title        = {The {MAGIC} Mode for Simultaneously Supporting Encryption, Message
                  Authentication and Error Correction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1460},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1460},
  timestamp    = {Wed, 02 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/KounavisDDMW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/YangFW20,
  title        = {Encryption scheme with mixed homomorphic signature based on message
                  authentication for digital image},
  journal      = {J. Supercomput.},
  volume       = {76},
  number       = {2},
  pages        = {1201--1211},
  year         = {2020},
  note         = {Withdrawn.},
  url          = {https://doi.org/10.1007/s11227-018-2528-x},
  doi          = {10.1007/S11227-018-2528-X},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tjs/YangFW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcm/Abdulhameed19,
  author       = {Zainab N. Abdulhameed},
  title        = {Transmission of an Encryption Audio Message Using Chaotic Map in a
                  Noisy Channel},
  journal      = {J. Commun.},
  volume       = {14},
  number       = {2},
  pages        = {142--147},
  year         = {2019},
  url          = {https://doi.org/10.12720/jcm.14.2.142-147},
  doi          = {10.12720/JCM.14.2.142-147},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcm/Abdulhameed19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/OhKYL19,
  author       = {Insu Oh and
                  Taeeun Kim and
                  Kangbin Yim and
                  Sun{-}Young Lee},
  title        = {A Novel Message-Preserving Scheme with Format-Preserving Encryption
                  for Connected Cars in Multi-Access Edge Computing},
  journal      = {Sensors},
  volume       = {19},
  number       = {18},
  pages        = {3869},
  year         = {2019},
  url          = {https://doi.org/10.3390/s19183869},
  doi          = {10.3390/S19183869},
  timestamp    = {Sat, 30 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/OhKYL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PanLLN19,
  author       = {Dongxue Pan and
                  Bei Liang and
                  Hongda Li and
                  Peifang Ni},
  editor       = {Julian Jang{-}Jaccard and
                  Fuchun Guo},
  title        = {Witness Encryption with (Weak) Unique Decryption and Message Indistinguishability:
                  Constructions and Applications},
  booktitle    = {Information Security and Privacy - 24th Australasian Conference, {ACISP}
                  2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11547},
  pages        = {609--619},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21548-4\_33},
  doi          = {10.1007/978-3-030-21548-4\_33},
  timestamp    = {Mon, 12 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PanLLN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/0001LPR0V19,
  author       = {Elena Andreeva and
                  Virginie Lallemand and
                  Antoon Purnal and
                  Reza Reyhanitabar and
                  Arnab Roy and
                  Damian Viz{\'{a}}r},
  editor       = {Steven D. Galbraith and
                  Shiho Moriai},
  title        = {Forkcipher: {A} New Primitive for Authenticated Encryption of Very
                  Short Messages},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kobe, Japan, December 8-12, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11922},
  pages        = {153--182},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34621-8\_6},
  doi          = {10.1007/978-3-030-34621-8\_6},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/0001LPR0V19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/TyagiGLMR19,
  author       = {Nirvan Tyagi and
                  Paul Grubbs and
                  Julia Len and
                  Ian Miers and
                  Thomas Ristenpart},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Asymmetric Message Franking: Content Moderation for Metadata-Private
                  End-to-End Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11694},
  pages        = {222--250},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26954-8\_8},
  doi          = {10.1007/978-3-030-26954-8\_8},
  timestamp    = {Fri, 09 Aug 2019 14:27:02 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/TyagiGLMR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kse/LuangoudomNTN19,
  author       = {Sonxay Luangoudom and
                  Tuyen Nguyen and
                  Duc Tran and
                  Linh Giang Nguyen},
  title        = {End to end message encryption using Poly1305 and XSalsa20 in Low power
                  and Lossy Networks},
  booktitle    = {11th International Conference on Knowledge and Systems Engineering,
                  {KSE} 2019, Da Nang, Vietnam, October 24-26, 2019},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/KSE.2019.8919479},
  doi          = {10.1109/KSE.2019.8919479},
  timestamp    = {Thu, 30 Jan 2020 15:40:00 +0100},
  biburl       = {https://dblp.org/rec/conf/kse/LuangoudomNTN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AndreevaLPRRV19,
  author       = {Elena Andreeva and
                  Virginie Lallemand and
                  Antoon Purnal and
                  Reza Reyhanitabar and
                  Arnab Roy and
                  Damian Viz{\'{a}}r},
  title        = {Forkcipher: a New Primitive for Authenticated Encryption of Very Short
                  Messages},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1004},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1004},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AndreevaLPRRV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TyagiGLMR19,
  author       = {Nirvan Tyagi and
                  Paul Grubbs and
                  Julia Len and
                  Ian Miers and
                  Thomas Ristenpart},
  title        = {Asymmetric Message Franking: Content Moderation for Metadata-Private
                  End-to-End Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {565},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/565},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TyagiGLMR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fiict/LeraOBHL18,
  author       = {Francisco J. Rodr{\'{\i}}guez{-}Lera and
                  Vicente Matell{\'{a}}n Olivera and
                  Jes{\'{u}}s Balsa{-}Comer{\'{o}}n and
                  {\'{A}}ngel Manuel Guerrero{-}Higueras and
                  Camino Fern{\'{a}}ndez Llamas},
  title        = {Message Encryption in Robot Operating System: Collateral Effects of
                  Hardening Mobile Robots},
  journal      = {Frontiers {ICT}},
  volume       = {5},
  pages        = {2},
  year         = {2018},
  url          = {https://doi.org/10.3389/fict.2018.00002},
  doi          = {10.3389/FICT.2018.00002},
  timestamp    = {Thu, 25 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fiict/LeraOBHL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/WangCLYW18,
  author       = {Huige Wang and
                  Kefei Chen and
                  Yu Long and
                  Junyao Ye and
                  Liangliang Wang},
  title        = {A new randomized message-locked encryption in the standard model},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {11},
  number       = {2},
  pages        = {298--308},
  year         = {2018},
  url          = {https://doi.org/10.1007/s12083-016-0488-6},
  doi          = {10.1007/S12083-016-0488-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/WangCLYW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/AminifarEP18,
  author       = {Amir Aminifar and
                  Petru Eles and
                  Zebo Peng},
  title        = {Optimization of Message Encryption for Real-Time Applications in Embedded
                  Systems},
  journal      = {{IEEE} Trans. Computers},
  volume       = {67},
  number       = {5},
  pages        = {748--754},
  year         = {2018},
  url          = {https://doi.org/10.1109/TC.2017.2778728},
  doi          = {10.1109/TC.2017.2778728},
  timestamp    = {Fri, 11 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/AminifarEP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/YounJC18,
  author       = {Taek{-}Young Youn and
                  Nam{-}Su Jho and
                  Ku{-}Young Chang},
  title        = {Design of additive homomorphic encryption with multiple message spaces
                  for secure and practical storage services over encrypted data},
  journal      = {J. Supercomput.},
  volume       = {74},
  number       = {8},
  pages        = {3620--3638},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11227-016-1796-6},
  doi          = {10.1007/S11227-016-1796-6},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/YounJC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/KandeleP18,
  author       = {Suyash Kandele and
                  Souradyuti Paul},
  editor       = {Bart Preneel and
                  Frederik Vercauteren},
  title        = {Message-Locked Encryption with File Update},
  booktitle    = {Applied Cryptography and Network Security - 16th International Conference,
                  {ACNS} 2018, Leuven, Belgium, July 2-4, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10892},
  pages        = {678--695},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93387-0\_35},
  doi          = {10.1007/978-3-319-93387-0\_35},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/KandeleP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/SaarinenBGRTZ18,
  author       = {Markku{-}Juhani O. Saarinen and
                  Sauvik Bhattacharya and
                  {\'{O}}scar Garc{\'{\i}}a{-}Morch{\'{o}}n and
                  Ronald Rietman and
                  Ludo Tolhuizen and
                  Zhenfei Zhang},
  editor       = {Beg{\"{u}}l Bilgin and
                  Jean{-}Bernard Fischer},
  title        = {Shorter Messages and Faster Post-Quantum Encryption with Round5 on
                  Cortex {M}},
  booktitle    = {Smart Card Research and Advanced Applications, 17th International
                  Conference, {CARDIS} 2018, Montpellier, France, November 12-14, 2018,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11389},
  pages        = {95--110},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-15462-2\_7},
  doi          = {10.1007/978-3-030-15462-2\_7},
  timestamp    = {Sat, 30 Sep 2023 09:35:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/SaarinenBGRTZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/IsobeM18,
  author       = {Takanori Isobe and
                  Kazuhiko Minematsu},
  editor       = {Javier L{\'{o}}pez and
                  Jianying Zhou and
                  Miguel Soriano},
  title        = {Breaking Message Integrity of an End-to-End Encryption Scheme of {LINE}},
  booktitle    = {Computer Security - 23rd European Symposium on Research in Computer
                  Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11099},
  pages        = {249--268},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-98989-1\_13},
  doi          = {10.1007/978-3-319-98989-1\_13},
  timestamp    = {Fri, 03 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/IsobeM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/LingMHL18,
  author       = {Yunhao Ling and
                  Sha Ma and
                  Qiong Huang and
                  Ximing Li},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {A General Two-Server Framework for Ciphertext-Checkable Encryption
                  Against Offline Message Recovery Attack},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11065},
  pages        = {370--382},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00012-7\_34},
  doi          = {10.1007/978-3-030-00012-7\_34},
  timestamp    = {Thu, 22 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/LingMHL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/SongHZ18,
  author       = {Wei{-}Tao Song and
                  Bin Hu and
                  Xiu{-}Feng Zhao},
  title        = {Multi-bit Leveled Homomorphic Encryption of Message Matrices},
  booktitle    = {Proceedings of the 2nd International Conference on Cryptography, Security
                  and Privacy, {ICCSP} 2018, Guiyang, China, March 16-19, 2018},
  pages        = {45--50},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3199478.3199501},
  doi          = {10.1145/3199478.3199501},
  timestamp    = {Mon, 15 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsp/SongHZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/ZhangT18,
  author       = {Rui Zhang and
                  Yang Tao},
  editor       = {David Naccache and
                  Shouhuai Xu and
                  Sihan Qing and
                  Pierangela Samarati and
                  Gregory Blanc and
                  Rongxing Lu and
                  Zonghua Zhang and
                  Ahmed Meddahi},
  title        = {Key Dependent Message Security for Revocable Identity-Based Encryption
                  and Identity-Based Encryption},
  booktitle    = {Information and Communications Security - 20th International Conference,
                  {ICICS} 2018, Lille, France, October 29-31, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11149},
  pages        = {426--441},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01950-1\_25},
  doi          = {10.1007/978-3-030-01950-1\_25},
  timestamp    = {Mon, 01 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/ZhangT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DottlingGHM18,
  author       = {Nico D{\"{o}}ttling and
                  Sanjam Garg and
                  Mohammad Hajiabadi and
                  Daniel Masny},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {New Constructions of Identity-Based and Key-Dependent Message Secure
                  Encryption Schemes},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10769},
  pages        = {3--31},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76578-5\_1},
  doi          = {10.1007/978-3-319-76578-5\_1},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DottlingGHM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KitagawaT18,
  author       = {Fuyuki Kitagawa and
                  Keisuke Tanaka},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {Key Dependent Message Security and Receiver Selective Opening Security
                  for Identity-Based Encryption},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10769},
  pages        = {32--61},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76578-5\_2},
  doi          = {10.1007/978-3-319-76578-5\_2},
  timestamp    = {Fri, 13 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/KitagawaT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1812-06050,
  author       = {Min Liang and
                  Li Yang},
  title        = {Block encryption of quantum messages},
  journal      = {CoRR},
  volume       = {abs/1812.06050},
  year         = {2018},
  url          = {http://arxiv.org/abs/1812.06050},
  eprinttype    = {arXiv},
  eprint       = {1812.06050},
  timestamp    = {Tue, 01 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1812-06050.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AndreevaRVV18,
  author       = {Elena Andreeva and
                  Reza Reyhanitabar and
                  Kerem Varici and
                  Damian Viz{\'{a}}r},
  title        = {Forking a Blockcipher for Authenticated Encryption of Very Short Messages},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {916},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/916},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AndreevaRVV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IsobeM18,
  author       = {Takanori Isobe and
                  Kazuhiko Minematsu},
  title        = {Breaking Message Integrity of an End-to-End Encryption Scheme of {LINE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {668},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/668},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IsobeM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KandeleP18,
  author       = {Suyash Kandele and
                  Souradyuti Paul},
  title        = {Message-locked Encryption with File Update},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {422},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/422},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KandeleP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SaarinenBGRTZ18,
  author       = {Markku{-}Juhani O. Saarinen and
                  Sauvik Bhattacharya and
                  {\'{O}}scar Garc{\'{\i}}a{-}Morch{\'{o}}n and
                  Ronald Rietman and
                  Ludo Tolhuizen and
                  Zhenfei Zhang},
  title        = {Shorter Messages and Faster Post-Quantum Encryption with Round5 on
                  Cortex {M}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {723},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/723},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SaarinenBGRTZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/WangCQLW17,
  author       = {Huige Wang and
                  Kefei Chen and
                  Baodong Qin and
                  Xuejia Lai and
                  Yunhua Wen},
  title        = {A new construction on randomized message-locked encryption in the
                  standard model via UCEs},
  journal      = {Sci. China Inf. Sci.},
  volume       = {60},
  number       = {5},
  pages        = {52101},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11432-015-1037-2},
  doi          = {10.1007/S11432-015-1037-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/WangCQLW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/ChenMMS17,
  author       = {Jiageng Chen and
                  Rashed Mazumder and
                  Atsuko Miyaji and
                  Chunhua Su},
  title        = {Variable message encryption through blockcipher compression function},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {29},
  number       = {7},
  year         = {2017},
  url          = {https://doi.org/10.1002/cpe.3956},
  doi          = {10.1002/CPE.3956},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/ChenMMS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/BansalCS17,
  author       = {Tarun Kumar Bansal and
                  Donghoon Chang and
                  Somitra Kumar Sanadhya},
  title        = {Sponge-based {CCA2} secure asymmetric encryption for arbitrary length
                  message (extended version)},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {3},
  number       = {3},
  pages        = {262--287},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJACT.2017.10007290},
  doi          = {10.1504/IJACT.2017.10007290},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/BansalCS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijst/GhasemzadehE17,
  author       = {Ardalan Ghasemzadeh and
                  Elham Esmaeili},
  title        = {A novel method in audio message encryption based on a mixture of chaos
                  function},
  journal      = {Int. J. Speech Technol.},
  volume       = {20},
  number       = {4},
  pages        = {829--837},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10772-017-9452-y},
  doi          = {10.1007/S10772-017-9452-Y},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijst/GhasemzadehE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/WatanabeSM17,
  author       = {Dai Watanabe and
                  Hisao Sakazaki and
                  Kunihiko Miyazaki},
  title        = {Representative System and Security Message Transmission using Re-encryption
                  Scheme Based on Symmetric-key Cryptography},
  journal      = {J. Inf. Process.},
  volume       = {25},
  pages        = {67--74},
  year         = {2017},
  url          = {https://doi.org/10.2197/ipsjjip.25.67},
  doi          = {10.2197/IPSJJIP.25.67},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jip/WatanabeSM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/HuangZW17,
  author       = {Ke Huang and
                  Xiaosong Zhang and
                  Xiao{-}Fen Wang},
  title        = {Block-Level Message-Locked Encryption with Polynomial Commitment for
                  IoT Data},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {33},
  number       = {4},
  pages        = {891--905},
  year         = {2017},
  url          = {https://jise.iis.sinica.edu.tw/JISESearch/pages/View/PaperView.jsf?keyId=157\_2047},
  timestamp    = {Thu, 11 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/HuangZW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AgrawalC17,
  author       = {Shashank Agrawal and
                  Melissa Chase},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {{FAME:} Fast Attribute-based Message Encryption},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {665--682},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3134014},
  doi          = {10.1145/3133956.3134014},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/AgrawalC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhaoC17,
  author       = {Yongjun Zhao and
                  Sherman S. M. Chow},
  editor       = {Ramesh Karri and
                  Ozgur Sinanoglu and
                  Ahmad{-}Reza Sadeghi and
                  Xun Yi},
  title        = {Updatable Block-Level Message-Locked Encryption},
  booktitle    = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
                  2017},
  pages        = {449--460},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3052973.3053012},
  doi          = {10.1145/3052973.3053012},
  timestamp    = {Sun, 12 Nov 2023 02:11:41 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhaoC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/WuHZZ17,
  author       = {Xuguang Wu and
                  Yiliang Han and
                  Minqing Zhang and
                  Shuaishuai Zhu},
  editor       = {Xiaofeng Chen and
                  Dongdai Lin and
                  Moti Yung},
  title        = {Parallel Long Messages Encryption Scheme Based on Certificateless
                  Cryptosystem for Big Data},
  booktitle    = {Information Security and Cryptology - 13th International Conference,
                  Inscrypt 2017, Xi'an, China, November 3-5, 2017, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10726},
  pages        = {211--222},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-75160-3\_14},
  doi          = {10.1007/978-3-319-75160-3\_14},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/WuHZZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ciss/MazumderMS17,
  author       = {Rashed Mazumder and
                  Atsuko Miyaji and
                  Chunhua Su},
  title        = {A simple construction of encryption for a tiny domain message},
  booktitle    = {51st Annual Conference on Information Sciences and Systems, {CISS}
                  2017, Baltimore, MD, USA, March 22-24, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CISS.2017.7926080},
  doi          = {10.1109/CISS.2017.7926080},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/ciss/MazumderMS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GrubbsLR17,
  author       = {Paul Grubbs and
                  Jiahui Lu and
                  Thomas Ristenpart},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Message Franking via Committing Authenticated Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10403},
  pages        = {66--97},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63697-9\_3},
  doi          = {10.1007/978-3-319-63697-9\_3},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GrubbsLR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/FurutaYKEIF17,
  author       = {Yuuji Furuta and
                  Naoto Yanai and
                  Masashi Karasaki and
                  Katsuhiko Eguchi and
                  Yasunori Ishihara and
                  Toru Fujiwara},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Guillermo Navarro{-}Arribas and
                  Hannes Hartenstein and
                  Jordi Herrera{-}Joancomart{\'{\i}}},
  title        = {Towards Efficient and Secure Encrypted Databases: Extending Message-Locked
                  Encryption in Three-Party Model},
  booktitle    = {Data Privacy Management, Cryptocurrencies and Blockchain Technology
                  - {ESORICS} 2017 International Workshops, {DPM} 2017 and {CBT} 2017,
                  Oslo, Norway, September 14-15, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10436},
  pages        = {55--69},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-67816-0\_4},
  doi          = {10.1007/978-3-319-67816-0\_4},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/FurutaYKEIF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fruct/KorzhikFC17,
  author       = {Valery I. Korzhik and
                  Ivan Fedyanin and
                  Cuong Nguyen},
  title        = {Detection of stegosystems using block ciphers for encryption of the
                  embedded messages},
  booktitle    = {20th Conference of Open Innovations Association, {FRUCT} 2017, St.
                  Petersburg, Russia, April 3-7, 2017},
  pages        = {181--186},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/FRUCT.2017.8071309},
  doi          = {10.23919/FRUCT.2017.8071309},
  timestamp    = {Mon, 16 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fruct/KorzhikFC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/AcharyaD17,
  author       = {Kamalesh Acharya and
                  Ratna Dutta},
  editor       = {Tatsuaki Okamoto and
                  Yong Yu and
                  Man Ho Au and
                  Yannan Li},
  title        = {Provable Secure Constructions for Broadcast Encryption with Personalized
                  Messages},
  booktitle    = {Provable Security - 11th International Conference, ProvSec 2017, Xi'an,
                  China, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10592},
  pages        = {329--348},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68637-0\_20},
  doi          = {10.1007/978-3-319-68637-0\_20},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/provsec/AcharyaD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalC17a,
  author       = {Shashank Agrawal and
                  Melissa Chase},
  title        = {{FAME:} Fast Attribute-based Message Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {807},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/807},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalC17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DottlingGHM17,
  author       = {Nico D{\"{o}}ttling and
                  Sanjam Garg and
                  Mohammad Hajiabadi and
                  Daniel Masny},
  title        = {New Constructions of Identity-Based and Key-Dependent Message Secure
                  Encryption Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {978},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/978},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DottlingGHM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrubbsLR17,
  author       = {Paul Grubbs and
                  Jiahui Lu and
                  Thomas Ristenpart},
  title        = {Message Franking via Committing Authenticated Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {664},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/664},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GrubbsLR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KitagawaT17,
  author       = {Fuyuki Kitagawa and
                  Keisuke Tanaka},
  title        = {Key Dependent Message Security and Receiver Selective Opening Security
                  for Identity-Based Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {987},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/987},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KitagawaT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiangY17,
  author       = {Min Liang and
                  Li Yang},
  title        = {Block encryption of quantum messages},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1247},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1247},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiangY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuL17,
  author       = {Fanbao Liu and
                  Fengmei Liu},
  title        = {Universal Forgery with Birthday Paradox: Application to Blockcipher-based
                  Message Authentication Codes and Authenticated Encryptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {653},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/653},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc8103,
  author       = {Russell Housley},
  title        = {Using ChaCha20-Poly1305 Authenticated Encryption in the Cryptographic
                  Message Syntax {(CMS)}},
  journal      = {{RFC}},
  volume       = {8103},
  pages        = {1--9},
  year         = {2017},
  url          = {https://doi.org/10.17487/RFC8103},
  doi          = {10.17487/RFC8103},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc8103.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc8230,
  author       = {Michael B. Jones},
  title        = {Using {RSA} Algorithms with {CBOR} Object Signing and Encryption {(COSE)}
                  Messages},
  journal      = {{RFC}},
  volume       = {8230},
  pages        = {1--12},
  year         = {2017},
  url          = {https://doi.org/10.17487/RFC8230},
  doi          = {10.17487/RFC8230},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc8230.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc8291,
  author       = {Martin Thomson},
  title        = {Message Encryption for Web Push},
  journal      = {{RFC}},
  volume       = {8291},
  pages        = {1--13},
  year         = {2017},
  url          = {https://doi.org/10.17487/RFC8291},
  doi          = {10.17487/RFC8291},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc8291.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/basesearch/Luykx16,
  author       = {Atul Luykx},
  title        = {The Design and Analysis of Message Authentication and Authenticated
                  Encryption Schemes ; Ontwerp en analyse van berichtverificatie- en
                  geverifieerde encryptieschema's},
  school       = {Katholieke Universiteit Leuven, Belgium},
  year         = {2016},
  url          = {https://lirias.kuleuven.be/handle/123456789/539700},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/phd/basesearch/Luykx16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/ca/Hajiabadi16,
  author       = {Mohammad Hajiabadi},
  title        = {Encryption security against key-dependent-message attacks: applications,
                  realizations and separations},
  school       = {University of Victoria, Canada},
  year         = {2016},
  url          = {http://hdl.handle.net/1828/7454},
  timestamp    = {Fri, 05 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/ca/Hajiabadi16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cai/Villanyi16,
  author       = {Vikt{\'{o}}ria I. Vill{\'{a}}nyi},
  title        = {Simple Multi-Authority Attribute-Based Encryption for Short Messages},
  journal      = {Comput. Informatics},
  volume       = {35},
  number       = {1},
  pages        = {128--142},
  year         = {2016},
  url          = {http://www.cai.sk/ojs/index.php/cai/article/view/1318},
  timestamp    = {Mon, 14 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cai/Villanyi16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/Sasaki016a,
  author       = {Yu Sasaki and
                  Lei Wang},
  title        = {Message Extension Attack against Authenticated Encryptions: Application
                  to {PANDA}},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {99-A},
  number       = {1},
  pages        = {49--57},
  year         = {2016},
  url          = {https://doi.org/10.1587/transfun.E99.A.49},
  doi          = {10.1587/TRANSFUN.E99.A.49},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/Sasaki016a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/Dottling16,
  author       = {Nico D{\"{o}}ttling},
  title        = {Low Noise {LPN:} Key dependent message secure public key encryption
                  an sample amplification},
  journal      = {{IET} Inf. Secur.},
  volume       = {10},
  number       = {6},
  pages        = {372--385},
  year         = {2016},
  url          = {https://doi.org/10.1049/iet-ifs.2015.0495},
  doi          = {10.1049/IET-IFS.2015.0495},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/Dottling16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/JiangCWMSL16,
  author       = {Tao Jiang and
                  Xiaofeng Chen and
                  Qianhong Wu and
                  Jianfeng Ma and
                  Willy Susilo and
                  Wenjing Lou},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Towards Efficient Fully Randomized Message-Locked Encryption},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9722},
  pages        = {361--375},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40253-6\_22},
  doi          = {10.1007/978-3-319-40253-6\_22},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/JiangCWMSL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/GoyalJO16,
  author       = {Vipul Goyal and
                  Aayush Jain and
                  Adam O'Neill},
  editor       = {Jung Hee Cheon and
                  Tsuyoshi Takagi},
  title        = {Multi-input Functional Encryption with Unbounded-Message Security},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10032},
  pages        = {531--556},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53890-6\_18},
  doi          = {10.1007/978-3-662-53890-6\_18},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/GoyalJO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/CanardLP16,
  author       = {S{\'{e}}bastien Canard and
                  Fabien Laguillaumie and
                  Marie Paindavoine},
  editor       = {Sara Foresti and
                  Giuseppe Persiano},
  title        = {Verifiable Message-Locked Encryption},
  booktitle    = {Cryptology and Network Security - 15th International Conference, {CANS}
                  2016, Milan, Italy, November 14-16, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10052},
  pages        = {299--315},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-48965-0\_18},
  doi          = {10.1007/978-3-319-48965-0\_18},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/CanardLP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BellareHT16,
  author       = {Mihir Bellare and
                  Viet Tung Hoang and
                  Stefano Tessaro},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {Message-Recovery Attacks on Feistel-Based Format Preserving Encryption},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {444--455},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2978390},
  doi          = {10.1145/2976749.2978390},
  timestamp    = {Tue, 10 Nov 2020 20:00:49 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BellareHT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/JaegerRT16,
  author       = {Joseph Jaeger and
                  Thomas Ristenpart and
                  Qiang Tang},
  editor       = {Marc Fischlin and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Honey Encryption Beyond Message Recovery Security},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9665},
  pages        = {758--788},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49890-3\_29},
  doi          = {10.1007/978-3-662-49890-3\_29},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/JaegerRT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/GhassamiCK16,
  author       = {AmirEmad Ghassami and
                  Daniel F. Cullina and
                  Negar Kiyavash},
  title        = {Message partitioning and limited auxiliary randomness: Alternatives
                  to Honey Encryption},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2016,
                  Barcelona, Spain, July 10-15, 2016},
  pages        = {1371--1375},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ISIT.2016.7541523},
  doi          = {10.1109/ISIT.2016.7541523},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isit/GhassamiCK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/SteefSA16,
  author       = {Ahmad Steef and
                  Mohammad Nur Shamma and
                  A. Alkhatib},
  title        = {{RSA} algorithm with a new approach encryption and decryption message
                  text by ascii},
  journal      = {CoRR},
  volume       = {abs/1610.08832},
  year         = {2016},
  url          = {http://arxiv.org/abs/1610.08832},
  eprinttype    = {arXiv},
  eprint       = {1610.08832},
  timestamp    = {Thu, 02 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/SteefSA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareHT16,
  author       = {Mihir Bellare and
                  Viet Tung Hoang and
                  Stefano Tessaro},
  title        = {Message-recovery attacks on Feistel-based Format Preserving Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {794},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/794},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareHT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JaegerRT16,
  author       = {Joseph Jaeger and
                  Thomas Ristenpart and
                  Qiang Tang},
  title        = {Honey Encryption Beyond Message Recovery Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {174},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/174},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JaegerRT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/ethos/Davies15,
  author       = {Gareth T. Davies},
  title        = {Encryption in the presence of key-dependent messages and related-key
                  attacks},
  school       = {University of Bristol, {UK}},
  year         = {2015},
  url          = {https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.688349},
  timestamp    = {Tue, 05 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/ethos/Davies15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijitwe/ChenHLJW15,
  author       = {Hu Chen and
                  Yupu Hu and
                  Zhizhu Lian and
                  Huiwen Jia and
                  Xu An Wang},
  title        = {An Additively Homomorphic Encryption over Large Message Space},
  journal      = {Int. J. Inf. Technol. Web Eng.},
  volume       = {10},
  number       = {3},
  pages        = {82--102},
  year         = {2015},
  url          = {https://doi.org/10.4018/IJITWE.2015070106},
  doi          = {10.4018/IJITWE.2015070106},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijitwe/ChenHLJW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LaiHCWW15,
  author       = {Qiqi Lai and
                  Yupu Hu and
                  Yuan Chen and
                  Baocang Wang and
                  Fenghe Wang},
  title        = {New method of key-dependent message security for asymmetric encryption},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {13},
  pages        = {2157--2170},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1160},
  doi          = {10.1002/SEC.1160},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LaiHCWW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenMYG15,
  author       = {Rongmao Chen and
                  Yi Mu and
                  Guomin Yang and
                  Fuchun Guo},
  title        = {{BL-MLE:} Block-Level Message-Locked Encryption for Secure Large File
                  Deduplication},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {12},
  pages        = {2643--2652},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2470221},
  doi          = {10.1109/TIFS.2015.2470221},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChenMYG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BansalCS15,
  author       = {Tarun Kumar Bansal and
                  Donghoon Chang and
                  Somitra Kumar Sanadhya},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {Sponge Based {CCA2} Secure Asymmetric Encryption for Arbitrary Length
                  Message},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {93--106},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_6},
  doi          = {10.1007/978-3-319-19962-7\_6},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BansalCS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/NuidaK15,
  author       = {Koji Nuida and
                  Kaoru Kurosawa},
  editor       = {Elisabeth Oswald and
                  Marc Fischlin},
  title        = {(Batch) Fully Homomorphic Encryption over Integers for Non-Binary
                  Message Spaces},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9056},
  pages        = {537--555},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46800-5\_21},
  doi          = {10.1007/978-3-662-46800-5\_21},
  timestamp    = {Thu, 14 Oct 2021 09:58:16 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/NuidaK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BellareK15,
  author       = {Mihir Bellare and
                  Sriram Keelveedhi},
  editor       = {Jonathan Katz},
  title        = {Interactive Message-Locked Encryption and Secure Deduplication},
  booktitle    = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
                  USA, March 30 - April 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9020},
  pages        = {516--538},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46447-2\_23},
  doi          = {10.1007/978-3-662-46447-2\_23},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BellareK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/RuotiAMZS15,
  author       = {Scott Ruoti and
                  Jeff Andersen and
                  Tyler Monson and
                  Daniel Zappala and
                  Kent E. Seamons},
  title        = {MessageGuard: {A} Browser-based Platform for Usable, Content-Based
                  Encryption Research},
  journal      = {CoRR},
  volume       = {abs/1510.08943},
  year         = {2015},
  url          = {http://arxiv.org/abs/1510.08943},
  eprinttype    = {arXiv},
  eprint       = {1510.08943},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/RuotiAMZS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbadiBMRS15,
  author       = {Mart{\'{\i}}n Abadi and
                  Dan Boneh and
                  Ilya Mironov and
                  Ananth Raghunathan and
                  Gil Segev},
  title        = {Message-Locked Encryption for Lock-Dependent Messages},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {440},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/440},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbadiBMRS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BansalCS15,
  author       = {Tarun Kumar Bansal and
                  Donghoon Chang and
                  Somitra Kumar Sanadhya},
  title        = {Sponge based {CCA2} secure asymmetric encryption for arbitrary length
                  message},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {330},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/330},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BansalCS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareK15,
  author       = {Mihir Bellare and
                  Sriram Keelveedhi},
  title        = {Interactive Message-Locked Encryption and Secure Deduplication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {52},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/052},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoyalJO15,
  author       = {Vipul Goyal and
                  Aayush Jain and
                  Adam O'Neill},
  title        = {Multi-Input Functional Encryption with Unbounded-Message Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1113},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1113},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoyalJO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/us/Ravinarayanan14,
  author       = {Sriram Keelveedhi},
  title        = {Encryption when messages and keys are related /},
  school       = {University of California, San Diego, {USA}},
  year         = {2014},
  url          = {https://www.escholarship.org/uc/item/41j945st},
  timestamp    = {Wed, 15 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/us/Ravinarayanan14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/LaiCHWJ14,
  author       = {Qiqi Lai and
                  Yuan Chen and
                  Yupu Hu and
                  Baocang Wang and
                  Mingming Jiang},
  title        = {Construction of a key-dependent message secure symmetric encryption
                  scheme in the ideal cipher model},
  journal      = {Frontiers Comput. Sci.},
  volume       = {8},
  number       = {3},
  pages        = {469--477},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11704-014-3062-5},
  doi          = {10.1007/S11704-014-3062-5},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fcsc/LaiCHWJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/SasakiW14,
  author       = {Yu Sasaki and
                  Lei Wang},
  editor       = {Dimitris Gritzalis and
                  Aggelos Kiayias and
                  Ioannis G. Askoxylakis},
  title        = {Message Extension Attack against Authenticated Encryptions: Application
                  to {PANDA}},
  booktitle    = {Cryptology and Network Security - 13th International Conference, {CANS}
                  2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8813},
  pages        = {82--97},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12280-9\_6},
  doi          = {10.1007/978-3-319-12280-9\_6},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/SasakiW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BlazyKP14,
  author       = {Olivier Blazy and
                  Eike Kiltz and
                  Jiaxin Pan},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {(Hierarchical) Identity-Based Encryption from Affine Message Authentication},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8616},
  pages        = {408--425},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44371-2\_23},
  doi          = {10.1007/978-3-662-44371-2\_23},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BlazyKP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyberc/ChenZW14,
  author       = {Zhen Chen and
                  Wenfang Zhang and
                  Xiaomin Wang},
  title        = {A Robust Collaborative Threshold Authenticated Encryption Scheme Based
                  on Message Blocking},
  booktitle    = {2014 International Conference on Cyber-Enabled Distributed Computing
                  and Knowledge Discovery, CyberC 2014, Shanghai, China, October 13-15,
                  2014},
  pages        = {10--13},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CyberC.2014.12},
  doi          = {10.1109/CYBERC.2014.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyberc/ChenZW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyberc/ChenZW14a,
  author       = {Zhen Chen and
                  Wenfang Zhang and
                  Xiaomin Wang},
  title        = {A Robust Collaborative Threshold Authenticated Encryption Scheme Based
                  on Message Blocking},
  booktitle    = {2014 International Conference on Cyber-Enabled Distributed Computing
                  and Knowledge Discovery, CyberC 2014, Shanghai, China, October 13-15,
                  2014},
  pages        = {27--30},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CyberC.2014.15},
  doi          = {10.1109/CYBERC.2014.15},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyberc/ChenZW14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BohlDH14,
  author       = {Florian B{\"{o}}hl and
                  Gareth T. Davies and
                  Dennis Hofheinz},
  editor       = {Hugo Krawczyk},
  title        = {Encryption Schemes Secure under Related-Key and Key-Dependent Message
                  Attacks},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {483--500},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_28},
  doi          = {10.1007/978-3-642-54631-0\_28},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BohlDH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/DodisF14,
  author       = {Yevgeniy Dodis and
                  Dario Fiore},
  editor       = {Michel Abdalla and
                  Roberto De Prisco},
  title        = {Interactive Encryption and Message Authentication},
  booktitle    = {Security and Cryptography for Networks - 9th International Conference,
                  {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8642},
  pages        = {494--513},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10879-7\_28},
  doi          = {10.1007/978-3-319-10879-7\_28},
  timestamp    = {Thu, 23 Jun 2022 19:58:57 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/DodisF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlazyKP14,
  author       = {Olivier Blazy and
                  Eike Kiltz and
                  Jiaxin Pan},
  title        = {(Hierarchical) Identity-Based Encryption from Affine Message Authentication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {581},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/581},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlazyKP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NuidaK14,
  author       = {Koji Nuida and
                  Kaoru Kurosawa},
  title        = {(Batch) Fully Homomorphic Encryption over Integers for Non-Binary
                  Message Spaces},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {777},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/777},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NuidaK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/HanPL13,
  author       = {Jin Ho Han and
                  Jong Hwan Park and
                  Dong Hoon Lee},
  title        = {Transmission-Efficient Broadcast Encryption Scheme with Personalized
                  Messages},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {96-A},
  number       = {4},
  pages        = {796--806},
  year         = {2013},
  url          = {https://doi.org/10.1587/transfun.E96.A.796},
  doi          = {10.1587/TRANSFUN.E96.A.796},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/HanPL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/SakaiEHKO13,
  author       = {Yusuke Sakai and
                  Keita Emura and
                  Goichiro Hanaoka and
                  Yutaka Kawai and
                  Kazumasa Omote},
  title        = {Methods for Restricting Message Space in Public-Key Encryption},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {96-A},
  number       = {6},
  pages        = {1156--1168},
  year         = {2013},
  url          = {https://doi.org/10.1587/transfun.E96.A.1156},
  doi          = {10.1587/TRANSFUN.E96.A.1156},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/SakaiEHKO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/HsuL13,
  author       = {Chien{-}Lung Hsu and
                  Han{-}Yu Lin},
  title        = {An Identity-Based Key-Insulated Encryption with Message Linkages for
                  Peer-to-Peer Communication Network},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {7},
  number       = {11},
  pages        = {2928--2940},
  year         = {2013},
  url          = {https://doi.org/10.3837/tiis.2013.11.022},
  doi          = {10.3837/TIIS.2013.11.022},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itiis/HsuL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Tang013,
  author       = {Qiang Tang and
                  Xiaofeng Chen},
  editor       = {Kefei Chen and
                  Qi Xie and
                  Weidong Qiu and
                  Ninghui Li and
                  Wen{-}Guey Tzeng},
  title        = {Towards asymmetric searchable encryption with message recovery and
                  flexible search authorization},
  booktitle    = {8th {ACM} Symposium on Information, Computer and Communications Security,
                  {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013},
  pages        = {253--264},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2484313.2484346},
  doi          = {10.1145/2484313.2484346},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Tang013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AbadiBMRS13,
  author       = {Mart{\'{\i}}n Abadi and
                  Dan Boneh and
                  Ilya Mironov and
                  Ananth Raghunathan and
                  Gil Segev},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Message-Locked Encryption for Lock-Dependent Messages},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8042},
  pages        = {374--391},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40041-4\_21},
  doi          = {10.1007/978-3-642-40041-4\_21},
  timestamp    = {Sun, 16 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AbadiBMRS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BellareKR13,
  author       = {Mihir Bellare and
                  Sriram Keelveedhi and
                  Thomas Ristenpart},
  editor       = {Thomas Johansson and
                  Phong Q. Nguyen},
  title        = {Message-Locked Encryption and Secure Deduplication},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Athens, Greece, May 26-30, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7881},
  pages        = {296--312},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38348-9\_18},
  doi          = {10.1007/978-3-642-38348-9\_18},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BellareKR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisF13,
  author       = {Yevgeniy Dodis and
                  Dario Fiore},
  title        = {Interactive Encryption, Message Authentication, and Anonymous Key
                  Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {817},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/817},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/informaticaLT/ChangHY12,
  author       = {Ting Yi Chang and
                  Min{-}Shiang Hwang and
                  Wei{-}Pang Yang},
  title        = {Cryptanalysis on an Improved Version of ElGamal-Like Public-Key Encryption
                  Scheme for Encrypting Large Messages},
  journal      = {Informatica},
  volume       = {23},
  number       = {4},
  pages        = {537--562},
  year         = {2012},
  url          = {http://content.iospress.com/articles/informatica/inf23-4-03},
  timestamp    = {Tue, 26 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/informaticaLT/ChangHY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/DavidaF12,
  author       = {George I. Davida and
                  Yair Frankel},
  editor       = {David Naccache},
  title        = {Efficient Encryption and Storage of Close Distance Messages with Applications
                  to Cloud Storage},
  booktitle    = {Cryptography and Security: From Theory to Applications - Essays Dedicated
                  to Jean-Jacques Quisquater on the Occasion of His 65th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {6805},
  pages        = {465--473},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28368-0\_29},
  doi          = {10.1007/978-3-642-28368-0\_29},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/DavidaF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/GalindoHV12,
  author       = {David Galindo and
                  Javier Herranz and
                  Jorge L. Villar},
  editor       = {Sara Foresti and
                  Moti Yung and
                  Fabio Martinelli},
  title        = {Identity-Based Encryption with Master Key-Dependent Message Security
                  and Leakage-Resilience},
  booktitle    = {Computer Security - {ESORICS} 2012 - 17th European Symposium on Research
                  in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7459},
  pages        = {627--642},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33167-1\_36},
  doi          = {10.1007/978-3-642-33167-1\_36},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/GalindoHV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1203-3103,
  author       = {Sadaqat ur Rehman and
                  Muhammad Bilal and
                  Basharat Ahmad and
                  Khawaja Muhammad Yahya and
                  Anees Ullah and
                  Obaid Ur Rehman},
  title        = {Comparison Based Analysis of Different Cryptographic and Encryption
                  Techniques Using Message Authentication Code {(MAC)} in Wireless Sensor
                  Networks {(WSN)}},
  journal      = {CoRR},
  volume       = {abs/1203.3103},
  year         = {2012},
  url          = {http://arxiv.org/abs/1203.3103},
  eprinttype    = {arXiv},
  eprint       = {1203.3103},
  timestamp    = {Sat, 18 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1203-3103.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareKR12,
  author       = {Mihir Bellare and
                  Sriram Keelveedhi and
                  Thomas Ristenpart},
  title        = {Message-Locked Encryption and Secure Deduplication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {631},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/631},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareKR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalindoHV12,
  author       = {David Galindo and
                  Javier Herranz and
                  Jorge Luis Villar},
  title        = {Identity-Based Encryption with Master Key-Dependent Message Security
                  and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {142},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/142},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalindoHV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Unruh12a,
  author       = {Dominique Unruh},
  title        = {Programmable encryption and key-dependent messages},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {423},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/423},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Unruh12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc6476,
  author       = {Peter Gutmann},
  title        = {Using Message Authentication Code {(MAC)} Encryption in the Cryptographic
                  Message Syntax {(CMS)}},
  journal      = {{RFC}},
  volume       = {6476},
  pages        = {1--15},
  year         = {2012},
  url          = {https://doi.org/10.17487/RFC6476},
  doi          = {10.17487/RFC6476},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc6476.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijict/JenaJ11,
  author       = {Debasish Jena and
                  Sanjay Kumar Jena},
  title        = {A novel and efficient cryptosystem for large message encryption},
  journal      = {Int. J. Inf. Commun. Technol.},
  volume       = {3},
  number       = {1},
  pages        = {32--39},
  year         = {2011},
  url          = {https://doi.org/10.1504/IJICT.2011.039521},
  doi          = {10.1504/IJICT.2011.039521},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijict/JenaJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/umcs/OszywaG11,
  author       = {Wojciech Oszywa and
                  Rafal Gliwa},
  title        = {Combining message encryption and authentication},
  journal      = {Ann. {UMCS} Informatica},
  volume       = {11},
  number       = {2},
  pages        = {61--79},
  year         = {2011},
  url          = {https://doi.org/10.2478/v10065-011-0010-y},
  doi          = {10.2478/V10065-011-0010-Y},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/umcs/OszywaG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BrakerskiV11,
  author       = {Zvika Brakerski and
                  Vinod Vaikuntanathan},
  editor       = {Phillip Rogaway},
  title        = {Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent
                  Messages},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 14-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6841},
  pages        = {505--524},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22792-9\_29},
  doi          = {10.1007/978-3-642-22792-9\_29},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BrakerskiV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cse/YoonY11,
  author       = {Eun{-}Jun Yoon and
                  Kee{-}Young Yoo},
  editor       = {Wenyu Qu and
                  Kai Lin and
                  Yanming Shen and
                  Weisong Shi and
                  D. Frank Hsu and
                  Xiaolong Jin and
                  Francis C. M. Lau and
                  Junfeng Xu},
  title        = {A Practical Convertible Authenticated Encryption Scheme with Message
                  Linkages and Forward Secrecy},
  booktitle    = {14th {IEEE} International Conference on Computational Science and
                  Engineering, {CSE} 2011, Dalian, China, August 24-26, 2011},
  pages        = {339--342},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/CSE.2011.117},
  doi          = {10.1109/CSE.2011.117},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cse/YoonY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ddecs/JiangEP11,
  author       = {Ke Jiang and
                  Petru Eles and
                  Zebo Peng},
  editor       = {Rolf Kraemer and
                  Adam Pawlak and
                  Andreas Steininger and
                  Mario Sch{\"{o}}lzel and
                  Jaan Raik and
                  Heinrich Theodor Vierhaus},
  title        = {Optimization of message encryption for distributed embedded systems
                  with real-time constraints},
  booktitle    = {14th {IEEE} International Symposium on Design and Diagnostics of Electronic
                  Circuits {\&} Systems, {DDECS} 2011, Cottbus, Germany, April 13-15,
                  2011},
  pages        = {243--248},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/DDECS.2011.5783087},
  doi          = {10.1109/DDECS.2011.5783087},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ddecs/JiangEP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/LeeC11a,
  author       = {Namyoon Lee and
                  Joohwan Chun},
  title        = {Signal Space Alignment for an Encryption Message and Successive Network
                  Code Decoding on the {MIMO} K-Way Relay Channel},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2011, Kyoto, Japan, 5-9 June, 2011},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/icc.2011.5963437},
  doi          = {10.1109/ICC.2011.5963437},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/LeeC11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icend/OwuorQ11,
  author       = {Dennis Luke Owuor and
                  Guoyuan Qi},
  editor       = {Jim James Yonazi and
                  Eliamani Sedoyeka and
                  Ezendu Ariwa and
                  Eyas El{-}Qawasmeh},
  title        = {Message Signal Encryption Based on Qi Hyper-Chaos System},
  booktitle    = {e-Technologies and Networks for Development - First International
                  Conference, ICeND 2011, Dar-es-Salaam, Tanzania, August 3-5, 2011.
                  Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {171},
  pages        = {145--155},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22729-5\_13},
  doi          = {10.1007/978-3-642-22729-5\_13},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icend/OwuorQ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socpar/MittalM11,
  author       = {Varun Mittal and
                  Piyush Murli Agarwal},
  editor       = {Ajith Abraham and
                  Hongbo Liu and
                  Fuchun Sun and
                  Chen Guo and
                  Se{\'{a}}n F. McLoone and
                  Emilio Corchado},
  title        = {An encryption and decryption algorithm for messages transmitted by
                  phonetic alphabets},
  booktitle    = {Third International Conference of Soft Computing and Pattern Recognition,
                  SoCPaR 2011, Dalian, China, October 14-16, 2011},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/SoCPaR.2011.6089104},
  doi          = {10.1109/SOCPAR.2011.6089104},
  timestamp    = {Wed, 20 Jan 2021 09:06:52 +0100},
  biburl       = {https://dblp.org/rec/conf/socpar/MittalM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icde/KarabulutWNNSDS10,
  author       = {Y{\"{u}}cel Karabulut and
                  Harald Weppner and
                  Ike Nassi and
                  Anusha Nagarajan and
                  Yash Shroff and
                  Nishant Dubey and
                  Tyelisa Shields},
  title        = {End-to-end confidentiality for a message warehousing service using
                  Identity-Based Encryption},
  booktitle    = {Workshops Proceedings of the 26th International Conference on Data
                  Engineering, {ICDE} 2010, March 1-6, 2010, Long Beach, California,
                  {USA}},
  pages        = {33--40},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICDEW.2010.5452750},
  doi          = {10.1109/ICDEW.2010.5452750},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icde/KarabulutWNNSDS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/OhtakeHO10,
  author       = {Go Ohtake and
                  Goichiro Hanaoka and
                  Kazuto Ogawa},
  editor       = {Swee{-}Huay Heng and
                  Kaoru Kurosawa},
  title        = {Efficient Broadcast Encryption with Personalized Messages},
  booktitle    = {Provable Security - 4th International Conference, ProvSec 2010, Malacca,
                  Malaysia, October 13-15, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6402},
  pages        = {214--228},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16280-0\_15},
  doi          = {10.1007/978-3-642-16280-0\_15},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/OhtakeHO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sersc-isa/GiriBSJ10,
  author       = {Debasis Giri and
                  Prithayan Barua and
                  P. D. Srivastava and
                  Biswapati Jana},
  editor       = {Samir Kumar Bandyopadhyay and
                  Wael Adi and
                  Tai{-}Hoon Kim and
                  Yang Xiao},
  title        = {A Cryptosystem for Encryption and Decryption of Long Confidential
                  Messages},
  booktitle    = {Information Security and Assurance - 4th International Conference,
                  {ISA} 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {76},
  pages        = {86--96},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13365-7\_9},
  doi          = {10.1007/978-3-642-13365-7\_9},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sersc-isa/GiriBSJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1010-0937,
  author       = {Namyoon Lee and
                  Joohwan Chun},
  title        = {Signal Space Alignment for an Encryption Message and Successive Network
                  Code Decoding on the {MIMO} K-way Relay Channel},
  journal      = {CoRR},
  volume       = {abs/1010.0937},
  year         = {2010},
  url          = {http://arxiv.org/abs/1010.0937},
  eprinttype    = {arXiv},
  eprint       = {1010.0937},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1010-0937.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc5830,
  author       = {Vasily Dolmatov},
  title        = {{GOST} 28147-89: Encryption, Decryption, and Message Authentication
                  Code {(MAC)} Algorithms},
  journal      = {{RFC}},
  volume       = {5830},
  pages        = {1--19},
  year         = {2010},
  url          = {https://doi.org/10.17487/RFC5830},
  doi          = {10.17487/RFC5830},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc5830.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ChardinM09,
  author       = {Thomas Chardin and
                  Rapha{\"{e}}l Marinier},
  title        = {An Adaptive Chosen-plaintext Attack of the Improved Cellular Message
                  Encryption Algorithm},
  journal      = {Int. J. Netw. Secur.},
  volume       = {9},
  number       = {2},
  pages        = {173--179},
  year         = {2009},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v9-n2/ijns-2009-v9-n2-p173-179.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ChardinM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/SimplicioBBCM09,
  author       = {Marcos A. Simpl{\'{\i}}cio Jr. and
                  Pedro d'Aquino F. F. S. Barbuda and
                  Paulo S. L. M. Barreto and
                  Tereza Cristina M. B. Carvalho and
                  C{\'{\i}}ntia B. Margi},
  title        = {The {MARVIN} message authentication code and the {LETTERSOUP} authenticated
                  encryption scheme},
  journal      = {Secur. Commun. Networks},
  volume       = {2},
  number       = {2},
  pages        = {165--180},
  year         = {2009},
  url          = {https://doi.org/10.1002/sec.66},
  doi          = {10.1002/SEC.66},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/SimplicioBBCM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bmei/Xu09,
  author       = {Xiangyang Xu},
  title        = {Efficient Privacy of Message Encryption Algorithm for Anonymous Receivers
                  in E-Commerce},
  booktitle    = {Proceedings of the 2nd International Conference on BioMedical Engineering
                  and Informatics, {BMEI} 2009, October 17-19, 2009, Tianjin, China},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/BMEI.2009.5305827},
  doi          = {10.1109/BMEI.2009.5305827},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/bmei/Xu09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itng/RupaA09,
  author       = {Ch. Rupa and
                  P. S. Avadhani},
  editor       = {Shahram Latifi},
  title        = {Message Encryption Scheme Using Cheating Text},
  booktitle    = {Sixth International Conference on Information Technology: New Generations,
                  {ITNG} 2009, Las Vegas, Nevada, USA, 27-29 April 2009},
  pages        = {470--474},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ITNG.2009.232},
  doi          = {10.1109/ITNG.2009.232},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itng/RupaA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AbeKO09,
  author       = {Masayuki Abe and
                  Eike Kiltz and
                  Tatsuaki Okamoto},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {Compact CCA-Secure Encryption for Messages of Arbitrary Length},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {377--392},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_21},
  doi          = {10.1007/978-3-642-00468-1\_21},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AbeKO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/VascoP09,
  author       = {Mar{\'{\i}}a Isabel Gonz{\'{a}}lez Vasco and
                  Angel L. P{\'{e}}rez del Pozo},
  title        = {Related Message Attacks to Public Key Encryption Schemes: Relations
                  among Security Notions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {205},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/205},
  timestamp    = {Mon, 31 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/VascoP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc5409,
  author       = {Luther Martin and
                  Mark Schertler},
  title        = {Using the Boneh-Franklin and Boneh-Boyen Identity-Based Encryption
                  Algorithms with the Cryptographic Message Syntax {(CMS)}},
  journal      = {{RFC}},
  volume       = {5409},
  pages        = {1--13},
  year         = {2009},
  url          = {https://doi.org/10.17487/RFC5409},
  doi          = {10.17487/RFC5409},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc5409.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dent09a,
  title        = {On the Equivalence of Two Models for Key-Dependent-Message Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {572},
  year         = {2009},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2009/572},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dent09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/crossroads/DeHart08,
  author       = {Ed DeHart},
  title        = {Data encryption: mixing up the message in the name of security},
  journal      = {{ACM} Crossroads},
  volume       = {15},
  number       = {1},
  pages        = {21--27},
  year         = {2008},
  url          = {https://doi.org/10.1145/1452012.1452017},
  doi          = {10.1145/1452012.1452017},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/crossroads/DeHart08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/MukhopadhyayC08,
  author       = {Debdeep Mukhopadhyay and
                  Dipanwita Roy Chowdhury},
  title        = {Customizing Cellular Message Encryption Algorithm},
  journal      = {Int. J. Netw. Secur.},
  volume       = {7},
  number       = {2},
  pages        = {193--201},
  year         = {2008},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v7-n2/ijns-2008-v7-n2-p193-201.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/MukhopadhyayC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BackesPS08,
  author       = {Michael Backes and
                  Birgit Pfitzmann and
                  Andre Scedrov},
  title        = {Key-dependent message security under active attacks - BRSIM/UC-soundness
                  of Dolev-Yao-style encryption with key cycles},
  journal      = {J. Comput. Secur.},
  volume       = {16},
  number       = {5},
  pages        = {497--530},
  year         = {2008},
  url          = {https://doi.org/10.3233/JCS-2008-0332},
  doi          = {10.3233/JCS-2008-0332},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/BackesPS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Jutla08,
  author       = {Charanjit S. Jutla},
  title        = {Encryption Modes with Almost Free Message Integrity},
  journal      = {J. Cryptol.},
  volume       = {21},
  number       = {4},
  pages        = {547--578},
  year         = {2008},
  url          = {https://doi.org/10.1007/s00145-008-9024-z},
  doi          = {10.1007/S00145-008-9024-Z},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Jutla08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChardinM08,
  author       = {Thomas Chardin and
                  Rapha{\"{e}}l Marinier},
  title        = {Cryptanalysis of the Improved Cellular Message Encryption Algorithm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {445},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/445},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChardinM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/TzengTH07,
  author       = {Shiang{-}Feng Tzeng and
                  Yuan{-}Liang Tang and
                  Min{-}Shiang Hwang},
  title        = {A new convertible authenticated encryption scheme with message linkages},
  journal      = {Comput. Electr. Eng.},
  volume       = {33},
  number       = {2},
  pages        = {133--138},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.compeleceng.2006.02.005},
  doi          = {10.1016/J.COMPELECENG.2006.02.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/TzengTH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BackesPS07,
  author       = {Michael Backes and
                  Birgit Pfitzmann and
                  Andre Scedrov},
  title        = {Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness
                  of Symbolic Encryption with Key Cycles},
  booktitle    = {20th {IEEE} Computer Security Foundations Symposium, {CSF} 2007, 6-8
                  July 2007, Venice, Italy},
  pages        = {112--124},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/CSF.2007.23},
  doi          = {10.1109/CSF.2007.23},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BackesPS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc5084,
  author       = {Russell Housley},
  title        = {Using {AES-CCM} and {AES-GCM} Authenticated Encryption in the Cryptographic
                  Message Syntax {(CMS)}},
  journal      = {{RFC}},
  volume       = {5084},
  pages        = {1--11},
  year         = {2007},
  url          = {https://doi.org/10.17487/RFC5084},
  doi          = {10.17487/RFC5084},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc5084.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/HwangLHC06,
  author       = {Min{-}Shiang Hwang and
                  Jung{-}Wen Lo and
                  Shu{-}Yin Hsiao and
                  Yen{-}Ping Chu},
  title        = {Improvement of Authenticated Encryption Schemes with Message Linkages
                  for Message Flows},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {89-D},
  number       = {4},
  pages        = {1575--1577},
  year         = {2006},
  url          = {https://doi.org/10.1093/ietisy/e89-d.4.1575},
  doi          = {10.1093/IETISY/E89-D.4.1575},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/HwangLHC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc4615,
  author       = {JunHyuk Song and
                  Radha Poovendran and
                  Jicheol Lee and
                  Tetsu Iwata},
  title        = {The Advanced Encryption Standard-Cipher-based Message Authentication
                  Code-Pseudo-Random Function-128 {(AES-CMAC-PRF-128)} Algorithm for
                  the Internet Key Exchange Protocol {(IKE)}},
  journal      = {{RFC}},
  volume       = {4615},
  pages        = {1--7},
  year         = {2006},
  url          = {https://doi.org/10.17487/RFC4615},
  doi          = {10.17487/RFC4615},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc4615.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/ZhangAX05,
  author       = {Zhang Zhang and
                  Shunsuke Araki and
                  Guozhen Xiao},
  title        = {Improvement of Tseng et al.'s authenticated encryption scheme with
                  message linkages},
  journal      = {Appl. Math. Comput.},
  volume       = {162},
  number       = {3},
  pages        = {1475--1483},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.amc.2004.03.022},
  doi          = {10.1016/J.AMC.2004.03.022},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/amc/ZhangAX05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/HuangLLCC05,
  author       = {Chi{-}Hsiung Huang and
                  Chia{-}Yin Lee and
                  Chu{-}Hsing Lin and
                  Chin{-}Chen Chang and
                  Kuo{-}Lun Chen},
  title        = {Authenticated Encryption Schemes with Message Linkage for Threshold
                  Signatures},
  booktitle    = {19th International Conference on Advanced Information Networking and
                  Applications {(AINA} 2005), 28-30 March 2005, Taipei, Taiwan},
  pages        = {261--264},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/AINA.2005.123},
  doi          = {10.1109/AINA.2005.123},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/HuangLLCC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccnmc/PengXCDP05,
  author       = {Yin{-}Qiao Peng and
                  Shi{-}Yi Xie and
                  Yue{-}Feng Chen and
                  Rui Deng and
                  Ling{-}Xi Peng},
  editor       = {Xicheng Lu and
                  Wei Zhao},
  title        = {A Publicly Verifiable Authenticated Encryption Scheme with Message
                  Linkages},
  booktitle    = {Networking and Mobile Computing, Third International Conference, {ICCNMC}
                  2005, Zhangjiajie, China, August 2-4, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3619},
  pages        = {1271--1276},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11534310\_133},
  doi          = {10.1007/11534310\_133},
  timestamp    = {Fri, 09 Apr 2021 18:41:16 +0200},
  biburl       = {https://dblp.org/rec/conf/iccnmc/PengXCDP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/MukhopadhyayCNC05,
  author       = {Debdeep Mukhopadhyay and
                  Abhishek Chaudhary and
                  Arvind Nebhnani and
                  Dipanwita Roy Chowdhury},
  editor       = {Sushil Jajodia and
                  Chandan Mazumdar},
  title        = {{CCMEA:} Customized Cellular Message Encryption Algorithm for Wireless
                  Networks},
  booktitle    = {Information Systems Security, First International Conference, {ICISS}
                  2005, Kolkata, India, December 19-21, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3803},
  pages        = {217--227},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11593980\_16},
  doi          = {10.1007/11593980\_16},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/MukhopadhyayCNC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kes/YoonY05,
  author       = {Eun{-}Jun Yoon and
                  Kee{-}Young Yoo},
  editor       = {Rajiv Khosla and
                  Robert J. Howlett and
                  Lakhmi C. Jain},
  title        = {Robust Authenticated Encryption Scheme with Message Linkages},
  booktitle    = {Knowledge-Based Intelligent Information and Engineering Systems, 9th
                  International Conference, {KES} 2005, Melbourne, Australia, September
                  14-16, 2005, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3684},
  pages        = {281--288},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11554028\_40},
  doi          = {10.1007/11554028\_40},
  timestamp    = {Sun, 02 Jun 2019 21:22:00 +0200},
  biburl       = {https://dblp.org/rec/conf/kes/YoonY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mie/HassinenL05,
  author       = {Marko Hassinen and
                  Pertti Laitinen},
  editor       = {Rolf Engelbrecht and
                  Antoine Geissb{\"{u}}hler and
                  Christian Lovis and
                  George I. Mihalas},
  title        = {End-to-end Encryption for {SMS} Messages in the Health Care Domain},
  booktitle    = {Connecting Medical Informatics and Bio-Informatics - Proceedings of
                  {MIE} 2005 - The XIXth International Congress of the European Federation
                  for Medical Informatics, Geneva, Switzerland},
  series       = {Studies in Health Technology and Informatics},
  volume       = {116},
  pages        = {316--321},
  publisher    = {{IOS} Press},
  year         = {2005},
  url          = {http://ebooks.iospress.nl/volumearticle/10321},
  timestamp    = {Wed, 03 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mie/HassinenL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DodisS05,
  author       = {Yevgeniy Dodis and
                  Adam D. Smith},
  editor       = {Joe Kilian},
  title        = {Entropic Security and the Encryption of High Entropy Messages},
  booktitle    = {Theory of Cryptography, Second Theory of Cryptography Conference,
                  {TCC} 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3378},
  pages        = {556--577},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30576-7\_30},
  doi          = {10.1007/978-3-540-30576-7\_30},
  timestamp    = {Sun, 02 Jun 2019 21:21:22 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/DodisS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesPS05,
  author       = {Michael Backes and
                  Birgit Pfitzmann and
                  Andre Scedrov},
  title        = {Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness
                  of Symbolic Encryption with Key Cycles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {421},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/421},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesPS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc4010,
  author       = {Jongwook Park and
                  Sungjae Lee and
                  Jeeyeon Kim and
                  Jaeil Lee},
  title        = {Use of the {SEED} Encryption Algorithm in Cryptographic Message Syntax
                  {(CMS)}},
  journal      = {{RFC}},
  volume       = {4010},
  pages        = {1--13},
  year         = {2005},
  url          = {https://doi.org/10.17487/RFC4010},
  doi          = {10.17487/RFC4010},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc4010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/Chen04,
  author       = {Bi{-}Hui Chen},
  title        = {Improvements of authenticated encryption schemes with message linkages
                  for message flows},
  journal      = {Comput. Electr. Eng.},
  volume       = {30},
  number       = {7},
  pages        = {465--469},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.compeleceng.2004.07.001},
  doi          = {10.1016/J.COMPELECENG.2004.07.001},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cee/Chen04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eee/ChenHC04,
  author       = {Tzer{-}Shyong Chen and
                  Kuo{-}Hsuan Huang and
                  Yu{-}Fang Chung},
  title        = {A Division-of-Labor-Signature (t, n) Threshold-Authenticated Encryption
                  Scheme with Message Linkage Based on the Elliptic Curve Cryptosystem},
  booktitle    = {2004 {IEEE} International Conference on e-Technology, e-Commerce,
                  and e-Services {(EEE} 04), 29-31 March 2004, Taipei, Taiwan},
  pages        = {106--112},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/EEE.2004.1287295},
  doi          = {10.1109/EEE.2004.1287295},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eee/ChenHC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareGM04,
  author       = {Mihir Bellare and
                  Oded Goldreich and
                  Anton Mityagin},
  title        = {The Power of Verification Queries in Message Authentication and Authenticated
                  Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {309},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/309},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareGM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisS04,
  author       = {Yevgeniy Dodis and
                  Adam D. Smith},
  title        = {Entropic Security and the Encryption of High Entropy Messages},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {219},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/219},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc3657,
  author       = {Shiho Moriai and
                  Akihiro Kato},
  title        = {Use of the Camellia Encryption Algorithm in Cryptographic Message
                  Syntax {(CMS)}},
  journal      = {{RFC}},
  volume       = {3657},
  pages        = {1--14},
  year         = {2004},
  url          = {https://doi.org/10.17487/RFC3657},
  doi          = {10.17487/RFC3657},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc3657.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/TsengJC03,
  author       = {Yuh{-}Min Tseng and
                  Jinn{-}ke Jan and
                  Hung{-}Yu Chien},
  title        = {Authenticated encryption schemes with message linkages for message
                  flows},
  journal      = {Comput. Electr. Eng.},
  volume       = {29},
  number       = {1},
  pages        = {101--109},
  year         = {2003},
  url          = {https://doi.org/10.1016/S0045-7906(01)00010-6},
  doi          = {10.1016/S0045-7906(01)00010-6},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cee/TsengJC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HawkesR03,
  author       = {Philip Hawkes and
                  Gregory G. Rose},
  title        = {A Mode of Operation with Partial Encryption and Message Integrity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/001},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HawkesR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Zhu03a,
  author       = {Huafei Zhu},
  title        = {A Practical Elliptic Curve Public Key Encryption Scheme Provably Secure
                  Against Adaptive Chosen-message Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {87},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/087},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Zhu03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc3537,
  author       = {Jim Schaad and
                  Russell Housley},
  title        = {Wrapping a Hashed Message Authentication Code {(HMAC)} key with a
                  Triple-Data Encryption Standard {(DES)} Key or an Advanced Encryption
                  Standard {(AES)} Key},
  journal      = {{RFC}},
  volume       = {3537},
  pages        = {1--9},
  year         = {2003},
  url          = {https://doi.org/10.17487/RFC3537},
  doi          = {10.17487/RFC3537},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc3537.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc3565,
  author       = {Jim Schaad},
  title        = {Use of the Advanced Encryption Standard {(AES)} Encryption Algorithm
                  in Cryptographic Message Syntax {(CMS)}},
  journal      = {{RFC}},
  volume       = {3565},
  pages        = {1--14},
  year         = {2003},
  url          = {https://doi.org/10.17487/RFC3565},
  doi          = {10.17487/RFC3565},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc3565.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/TsengJ02,
  author       = {Yuh{-}Min Tseng and
                  Jinn{-}ke Jan},
  title        = {An Efficient Authenticated Encryption Scheme With Message Linkages
                  and Low Communication Costs},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {18},
  number       = {1},
  pages        = {41--46},
  year         = {2002},
  url          = {http://www.iis.sinica.edu.tw/page/jise/2002/200201\_04.html},
  timestamp    = {Fri, 16 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/TsengJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisedu/CaoDBK02,
  author       = {Qidong Cao and
                  John S. Davis and
                  Xue Bai and
                  Orlando E. Katter Jr.},
  title        = {Using ASP-Based Message Encryption Project to Teach Information Security
                  Concepts},
  journal      = {J. Inf. Syst. Educ.},
  volume       = {13},
  number       = {3},
  pages        = {183--188},
  year         = {2002},
  url          = {https://jise.org/Volume13/n3/JISEv13n3p183.html},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisedu/CaoDBK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CoronHJPPT02,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Helena Handschuh and
                  Marc Joye and
                  Pascal Paillier and
                  David Pointcheval and
                  Christophe Tymen},
  editor       = {David Naccache and
                  Pascal Paillier},
  title        = {Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages},
  booktitle    = {Public Key Cryptography, 5th International Workshop on Practice and
                  Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February
                  12-14, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2274},
  pages        = {17--33},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45664-3\_2},
  doi          = {10.1007/3-540-45664-3\_2},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/CoronHJPPT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/BlackRS02,
  author       = {John Black and
                  Phillip Rogaway and
                  Thomas Shrimpton},
  editor       = {Kaisa Nyberg and
                  Howard M. Heys},
  title        = {Encryption-Scheme Security in the Presence of Key-Dependent Messages},
  booktitle    = {Selected Areas in Cryptography, 9th Annual International Workshop,
                  {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002.
                  Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2595},
  pages        = {62--75},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36492-7\_6},
  doi          = {10.1007/3-540-36492-7\_6},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/BlackRS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlackRS02a,
  author       = {John Black and
                  Phillip Rogaway and
                  Thomas Shrimpton},
  title        = {Encryption-Scheme Security in the Presence of Key-Dependent Messages},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {100},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/100},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlackRS02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CoronHJPPT02,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Helena Handschuh and
                  Marc Joye and
                  Pascal Paillier and
                  David Pointcheval and
                  Christophe Tymen},
  title        = {Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {11},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/011},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CoronHJPPT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Jutla01,
  author       = {Charanjit S. Jutla},
  editor       = {Birgit Pfitzmann},
  title        = {Encryption Modes with Almost Free Message Integrity},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2001, International Conference
                  on the Theory and Application of Cryptographic Techniques, Innsbruck,
                  Austria, May 6-10, 2001, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {2045},
  pages        = {529--544},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44987-6\_32},
  doi          = {10.1007/3-540-44987-6\_32},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Jutla01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RussellW01,
  author       = {Alexander Russell and
                  Hong Wang},
  title        = {Efficient Encryption for Rich Message Spaces Under General Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {28},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/028},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RussellW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Jutla00,
  author       = {Charanjit S. Jutla},
  title        = {Encryption Modes with Almost Free Message Integrity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {39},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/039},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Jutla00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Law00,
  author       = {Tak{-}Ming Law},
  title        = {An Encryption Algorithm and Key-stream Generator for Chinese Text
                  Messages by Character Internal Code Structure},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {6},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/006},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Law00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MitomoK00,
  author       = {Masashi Mitomo and
                  Kaoru Kurosawa},
  title        = {How to Encrypt Long Messages without Large Size Symmetric/Asymmetric
                  Encryption Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {65},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/065},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MitomoK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/Yeun99,
  author       = {Chan Yeob Yeun},
  editor       = {Michael Walker},
  title        = {Digital Signature with Message Recovery and Authenticated Encryption
                  (Signcryption) - {A} Comparison},
  booktitle    = {Cryptography and Coding, 7th {IMA} International Conference, Cirencester,
                  UK, December 20-22, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1746},
  pages        = {307},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-46665-7\_35},
  doi          = {10.1007/3-540-46665-7\_35},
  timestamp    = {Wed, 18 Mar 2020 16:00:59 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/Yeun99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/LeeC97,
  author       = {Wei{-}Bin Lee and
                  Chin{-}Chen Chang},
  title        = {Authenticated Encryption Schemes with Linkage Between Message Blocks},
  journal      = {Inf. Process. Lett.},
  volume       = {63},
  number       = {5},
  pages        = {247--250},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0020-0190(97)00118-X},
  doi          = {10.1016/S0020-0190(97)00118-X},
  timestamp    = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ipl/LeeC97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/HwangCY96,
  author       = {Shin{-}Jia Hwang and
                  Chin{-}Chen Chang and
                  Wei{-}Pang Yang},
  title        = {Autenticated Encryption Schemes with Message Linkage},
  journal      = {Inf. Process. Lett.},
  volume       = {58},
  number       = {4},
  pages        = {189--195},
  year         = {1996},
  url          = {https://doi.org/10.1016/0020-0190(96)00032-4},
  doi          = {10.1016/0020-0190(96)00032-4},
  timestamp    = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ipl/HwangCY96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/FranklinH96,
  author       = {Matthew K. Franklin and
                  Stuart Haber},
  title        = {Joint Encryption and Message-Efficient Secure Computation},
  journal      = {J. Cryptol.},
  volume       = {9},
  number       = {4},
  pages        = {217--232},
  year         = {1996},
  url          = {https://doi.org/10.1007/BF00189261},
  doi          = {10.1007/BF00189261},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/FranklinH96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FranklinH93,
  author       = {Matthew K. Franklin and
                  Stuart Haber},
  editor       = {Douglas R. Stinson},
  title        = {Joint Encryption and Message-Efficient Secure Computation},
  booktitle    = {Advances in Cryptology - {CRYPTO} '93, 13th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {773},
  pages        = {266--277},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-48329-2\_23},
  doi          = {10.1007/3-540-48329-2\_23},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/FranklinH93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc1421,
  author       = {John Linn},
  title        = {Privacy Enhancement for Internet Electronic Mail: Part {I:} Message
                  Encryption and Authentication Procedures},
  journal      = {{RFC}},
  volume       = {1421},
  pages        = {1--42},
  year         = {1993},
  url          = {https://doi.org/10.17487/RFC1421},
  doi          = {10.17487/RFC1421},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc1421.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Christoffersson88,
  author       = {Per Christoffersson},
  title        = {Message authentication and encryption combined},
  journal      = {Comput. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {65--71},
  year         = {1988},
  url          = {https://doi.org/10.1016/0167-4048(88)90505-6},
  doi          = {10.1016/0167-4048(88)90505-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Christoffersson88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/MatsumotoI88,
  author       = {Tsutomu Matsumoto and
                  Hideki Imai},
  editor       = {Christoph G. G{\"{u}}nther},
  title        = {Public Quadratic Polynominal-Tuples for Efficient Signature-Verification
                  and Message-Encryption},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '88, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Davos, Switzerland, May
                  25-27, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {330},
  pages        = {419--453},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/3-540-45961-8\_39},
  doi          = {10.1007/3-540-45961-8\_39},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/MatsumotoI88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics