Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "message encryption"
@article{DBLP:journals/mta/FanfakhNC24, author = {Ahmed Fanfakh and Hassan Noura and Rapha{\"{e}}l Couturier}, title = {Simultaneous encryption and authentication of messages over GPUs}, journal = {Multim. Tools Appl.}, volume = {83}, number = {2}, pages = {4757--4789}, year = {2024}, url = {https://doi.org/10.1007/s11042-023-15451-5}, doi = {10.1007/S11042-023-15451-5}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mta/FanfakhNC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/LinCN24, author = {Shi Lin and Li Cui and Ke Niu}, title = {End-to-End Encrypted Message Distribution System for the Internet of Things Based on Conditional Proxy Re-Encryption}, journal = {Sensors}, volume = {24}, number = {2}, pages = {438}, year = {2024}, url = {https://doi.org/10.3390/s24020438}, doi = {10.3390/S24020438}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/LinCN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/YangFW24, title = {Retraction Note: Encryption scheme with mixed homomorphic signature based on message authentication for digital image}, journal = {J. Supercomput.}, volume = {80}, number = {7}, pages = {10192}, year = {2024}, url = {https://doi.org/10.1007/s11227-024-05981-6}, doi = {10.1007/S11227-024-05981-6}, timestamp = {Mon, 29 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/YangFW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/dnb/Moch23, author = {Alexander Moch}, title = {Provable security for lightweight message authentication and encryption}, school = {University of Mannheim, Germany}, year = {2023}, url = {https://madoc.bib.uni-mannheim.de/65508/}, urn = {urn:nbn:de:bsz:180-madoc-655089}, timestamp = {Fri, 02 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/phd/dnb/Moch23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/AcharyaSM23, author = {Kamalesh Acharya and Amit Kumar Singh and Sourav Mukhopadhyay}, title = {Constructions of broadcast encryption with personalized messages from bilinear map}, journal = {Comput. Commun.}, volume = {209}, pages = {91--101}, year = {2023}, url = {https://doi.org/10.1016/j.comcom.2023.06.023}, doi = {10.1016/J.COMCOM.2023.06.023}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/AcharyaSM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/YaoZ23, author = {Shuang Yao and Dawei Zhang}, title = {{BPRT:} {A} blockchain-based privacy-preserving transaction scheme based on an efficient broadcast encryption with personalized messages}, journal = {Trans. Emerg. Telecommun. Technol.}, volume = {34}, number = {1}, year = {2023}, url = {https://doi.org/10.1002/ett.4675}, doi = {10.1002/ETT.4675}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ett/YaoZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-com/WangHMXH23, author = {Shaoyu Wang and Kaizhi Huang and Keming Ma and Xiaoming Xu and Xiaoyan Hu}, title = {A lightweight encryption and message authentication framework for wireless communication}, journal = {{IET} Commun.}, volume = {17}, number = {3}, pages = {265--278}, year = {2023}, url = {https://doi.org/10.1049/cmu2.12535}, doi = {10.1049/CMU2.12535}, timestamp = {Sat, 19 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-com/WangHMXH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/MasadehAA23, author = {Shadi Rasheed Masadeh and Hamza Abbass Al{-}Sewadi and Mohammed Abbas Fadhil Al{-}Husainy}, title = {A message encryption scheme inspired by Sudoku puzzle}, journal = {Int. J. Inf. Comput. Secur.}, volume = {21}, number = {3/4}, pages = {399--413}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.132739}, doi = {10.1504/IJICS.2023.132739}, timestamp = {Wed, 13 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/MasadehAA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/remotesensing/LiuWZ23, author = {Sheng Liu and Di Wu and Lanyong Zhang}, title = {{CGAN} BeiDou Satellite Short-Message-Encryption Scheme Using Ship {PVT}}, journal = {Remote. Sens.}, volume = {15}, number = {1}, pages = {171}, year = {2023}, url = {https://doi.org/10.3390/rs15010171}, doi = {10.3390/RS15010171}, timestamp = {Thu, 04 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/remotesensing/LiuWZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdatasec/JainMV23, author = {Somil Jain and Cristina Hava Muntean and Rohit Verma}, title = {Honey2Fish - {A} Hybrid Encryption Approach for Improved Password and Message Security}, booktitle = {9th Intl Conference on Big Data Security on Cloud, BigDataSecurity, {IEEE} Intl Conference on High Performance and Smart Computing, {HPSC} and {IEEE} Intl Conference on Intelligent Data and Security {IDS} 2023, New York, NY, USA, May 6-8, 2023}, pages = {198--203}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/BigDataSecurity-HPSC-IDS58521.2023.00042}, doi = {10.1109/BIGDATASECURITY-HPSC-IDS58521.2023.00042}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bigdatasec/JainMV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/LyuL23, author = {You Lyu and Shengli Liu}, editor = {Gene Tsudik and Mauro Conti and Kaitai Liang and Georgios Smaragdakis}, title = {Two-Message Authenticated Key Exchange from Public-Key Encryption}, booktitle = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14344}, pages = {414--434}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-50594-2\_21}, doi = {10.1007/978-3-031-50594-2\_21}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/LyuL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ol2a/ValenteBCC023, author = {David Valente and Thadeu Brito and M{\'{a}}rcio Correia and Jos{\'{e}} Augusto Carvalho and Jos{\'{e}} Lima}, editor = {Ana I. Pereira and Armando B. Mendes and Florbela P. Fernandes and Maria F. Pacheco and Jo{\~{a}}o Paulo Coelho and Jos{\'{e}} Lima}, title = {Image Transfer over {MQTT} in IoT: Message Segmentation and Encryption for Remote Indicator Panels}, booktitle = {Optimization, Learning Algorithms and Applications - Third International Conference, {OL2A} 2023, Ponta Delgada, Portugal, September 27-29, 2023, Revised Selected Papers, Part {I}}, series = {Communications in Computer and Information Science}, volume = {1981}, pages = {360--373}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-53025-8\_25}, doi = {10.1007/978-3-031-53025-8\_25}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ol2a/ValenteBCC023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/Ka23, author = {Ahmad Khoureich Ka}, editor = {Mark Manulis and Diana Maimut and George Teseleanu}, title = {M-Sel: {A} Message Selection Functional Encryption from Simple Tools}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 16th International Conference, SecITC 2023, Bucharest, Romania, November 23-24, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14534}, pages = {79--96}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-52947-4\_7}, doi = {10.1007/978-3-031-52947-4\_7}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secitc/Ka23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LyuL23, author = {You Lyu and Shengli Liu}, title = {Two-Message Authenticated Key Exchange from Public-Key Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {706}, year = {2023}, url = {https://eprint.iacr.org/2023/706}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LyuL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/Shanableh22, author = {Tamer Shanableh}, title = {{HEVC} Video Encryption With High Capacity Message Embedding by Altering Picture Reference Indices and Motion Vectors}, journal = {{IEEE} Access}, volume = {10}, pages = {22320--22329}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3152548}, doi = {10.1109/ACCESS.2022.3152548}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/Shanableh22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entropy/AbuTahaAA22, author = {Mohammed AbuTaha and Islam Amar and Salman AlQahtani}, title = {Parallel and Practical Approach of Efficient Image Chaotic Encryption Based on Message Passing Interface {(MPI)}}, journal = {Entropy}, volume = {24}, number = {4}, pages = {566}, year = {2022}, url = {https://doi.org/10.3390/e24040566}, doi = {10.3390/E24040566}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entropy/AbuTahaAA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/NouraSCC22, author = {Hassan N. Noura and Ola Salman and Rapha{\"{e}}l Couturier and Ali Chehab}, title = {A Single-Pass and One-Round Message Authentication Encryption for Limited IoT Devices}, journal = {{IEEE} Internet Things J.}, volume = {9}, number = {18}, pages = {17885--17900}, year = {2022}, url = {https://doi.org/10.1109/JIOT.2022.3161192}, doi = {10.1109/JIOT.2022.3161192}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/NouraSCC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/XiongWZZHK22, author = {Hu Xiong and Lili Wang and Zhida Zhou and Zetong Zhao and Xin Huang and Saru Kumari}, title = {Burn After Reading: Adaptively Secure Puncturable Identity-Based Proxy Re-Encryption Scheme for Securing Group Message}, journal = {{IEEE} Internet Things J.}, volume = {9}, number = {13}, pages = {11248--11260}, year = {2022}, url = {https://doi.org/10.1109/JIOT.2021.3126230}, doi = {10.1109/JIOT.2021.3126230}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/XiongWZZHK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/LiuYSTCL22, author = {Xueqiao Liu and Guomin Yang and Willy Susilo and Joseph Tonien and Rongmao Chen and Xixiang Lv}, title = {Message-Locked Searchable Encryption: {A} New Versatile Tool for Secure Cloud Storage}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {15}, number = {3}, pages = {1664--1677}, year = {2022}, url = {https://doi.org/10.1109/TSC.2020.3006532}, doi = {10.1109/TSC.2020.3006532}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/LiuYSTCL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aiccsa/AggarwalS22, author = {Akshit Aggarwal and Srinibas Swain}, title = {Blind Two Party {ECDSA} Signing Based Homomorphic Encryption over Message Passing}, booktitle = {19th {IEEE/ACS} International Conference on Computer Systems and Applications, {AICCSA} 2022, Abu Dhabi, United Arab Emirates, December 5-8, 2022}, pages = {1--5}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/AICCSA56895.2022.10017657}, doi = {10.1109/AICCSA56895.2022.10017657}, timestamp = {Thu, 26 Jan 2023 11:35:09 +0100}, biburl = {https://dblp.org/rec/conf/aiccsa/AggarwalS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/CampanelliDKKN22, author = {Matteo Campanelli and Bernardo David and Hamidreza Khoshakhlagh and Anders Konring and Jesper Buus Nielsen}, editor = {Shweta Agrawal and Dongdai Lin}, title = {Encryption to the Future - {A} Paradigm for Sending Secret Messages to Future (Anonymous) Committees}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13793}, pages = {151--180}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22969-5\_6}, doi = {10.1007/978-3-031-22969-5\_6}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/CampanelliDKKN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/LiuYWX22, author = {Qiuming Liu and Zhexin Yao and Zhen Wu and Zeyao Xu}, editor = {Sanjay Goel and Pavel Gladyshev and Akatyev Nikolay and George Markowsky and Daryl Johnson}, title = {Attribute-Based Proxy Re-encryption with Privacy Protection for Message Dissemination in {VANET}}, booktitle = {Digital Forensics and Cyber Crime - 13th {EAI} International Conference, {ICDF2C} 2022, Boston, MA, November 16-18, 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {508}, pages = {387--402}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-36574-4\_23}, doi = {10.1007/978-3-031-36574-4\_23}, timestamp = {Mon, 17 Jul 2023 16:28:01 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/LiuYWX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispacs/KazmiQHN22, author = {Syed Hussain Ali Kazmi and Faizan Qamar and Rosilah Hassan and Kashif Nisar}, title = {Improved QoS in Internet of Things (IoTs) through Short Messages Encryption Scheme for Wireless Sensor Communication}, booktitle = {International Symposium on Intelligent Signal Processing and Communication Systems, {ISPACS} 2022, Penang, Malaysia, November 22-25, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ISPACS57703.2022.10082815}, doi = {10.1109/ISPACS57703.2022.10082815}, timestamp = {Sat, 22 Apr 2023 17:02:05 +0200}, biburl = {https://dblp.org/rec/conf/ispacs/KazmiQHN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/WuJ022, author = {Shaoqiang Wu and Chunfu Jia and Ding Wang}, editor = {Weizhi Meng and Simone Fischer{-}H{\"{u}}bner and Christian Damsgaard Jensen}, title = {{UP-MLE:} Efficient and Practical Updatable Block-Level Message-Locked Encryption Scheme Based on Update Properties}, booktitle = {{ICT} Systems Security and Privacy Protection - 37th {IFIP} {TC} 11 International Conference, {SEC} 2022, Copenhagen, Denmark, June 13-15, 2022, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {648}, pages = {251--269}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-06975-8\_15}, doi = {10.1007/978-3-031-06975-8\_15}, timestamp = {Tue, 21 Jun 2022 15:17:37 +0200}, biburl = {https://dblp.org/rec/conf/sec/WuJ022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wasa/XuCHCG22, author = {Shiyuan Xu and Xue Chen and Yunhua He and Yibo Cao and Shang Gao}, editor = {Lei Wang and Michael Segal and Jenhui Chen and Tie Qiu}, title = {{VMT:} Secure VANETs Message Transmission Scheme with Encryption and Blockchain}, booktitle = {Wireless Algorithms, Systems, and Applications - 17th International Conference, {WASA} 2022, Dalian, China, November 24-26, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13471}, pages = {244--257}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-19208-1\_21}, doi = {10.1007/978-3-031-19208-1\_21}, timestamp = {Tue, 14 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wasa/XuCHCG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computers/MarjaiLK21, author = {P{\'{e}}ter Marjai and P{\'{e}}ter Lehotay{-}K{\'{e}}ry and Attila Kiss}, title = {The Use of Template Miners and Encryption in Log Message Compression}, journal = {Comput.}, volume = {10}, number = {7}, pages = {83}, year = {2021}, url = {https://doi.org/10.3390/computers10070083}, doi = {10.3390/COMPUTERS10070083}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computers/MarjaiLK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhaoC21, author = {Yongjun Zhao and Sherman S. M. Chow}, title = {Updatable Block-Level Message-Locked Encryption}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {4}, pages = {1620--1631}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2922403}, doi = {10.1109/TDSC.2019.2922403}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhaoC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aicsp/KahlaBLKA21, author = {Mohammed Elhabib Kahla and Mounir Beggas and Abdelkader Laouid and Mostefa Kara and Muath AlShaikh}, title = {Asymmetric Image Encryption Based on Twin Message Fusion}, booktitle = {2021 International Conference on Artificial Intelligence for Cyber Security Systems and Privacy (AI-CSP), El Oued, Algeria, November 20-21, 2021}, pages = {1--5}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/AI-CSP52968.2021.9671161}, doi = {10.1109/AI-CSP52968.2021.9671161}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aicsp/KahlaBLKA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/PanCZS21, author = {Jing Pan and Xiaofeng Chen and Fangguo Zhang and Willy Susilo}, editor = {Mehdi Tibouchi and Huaxiong Wang}, title = {Lattice-Based Group Encryption with Full Dynamicity and Message Filtering Policy}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {13093}, pages = {156--186}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92068-5\_6}, doi = {10.1007/978-3-030-92068-5\_6}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/PanCZS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/WuTWSM21, author = {Suzhen Wu and Zhanhong Tu and Zuocheng Wang and Zhirong Shen and Bo Mao}, title = {When Delta Sync Meets Message-Locked Encryption: a Feature-based Delta Sync Scheme for Encrypted Cloud Storage}, booktitle = {41st {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2021, Washington DC, USA, July 7-10, 2021}, pages = {337--347}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICDCS51616.2021.00040}, doi = {10.1109/ICDCS51616.2021.00040}, timestamp = {Wed, 13 Oct 2021 15:47:30 +0200}, biburl = {https://dblp.org/rec/conf/icdcs/WuTWSM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/NguyenSSWXZ21, author = {Khoa Nguyen and Reihaneh Safavi{-}Naini and Willy Susilo and Huaxiong Wang and Yanhong Xu and Neng Zeng}, editor = {Juan A. Garay}, title = {Group Encryption: Full Dynamicity, Message Filtering and Code-Based Instantiation}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12711}, pages = {678--708}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75248-4\_24}, doi = {10.1007/978-3-030-75248-4\_24}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/NguyenSSWXZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Akgul0DM21, author = {Omer Akgul and Wei Bai and Shruti Das and Michelle L. Mazurek}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Evaluating In-Workflow Messages for Improving Mental Models of End-to-End Encryption}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {447--464}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/akgul}, timestamp = {Mon, 20 Nov 2023 08:57:49 +0100}, biburl = {https://dblp.org/rec/conf/uss/Akgul0DM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2110-07009, author = {Luke A. Bauer and James K. Howes IV and Sam A. Markelon and Vincent Bindschaedler and Thomas Shrimpton}, title = {Covert Message Passing over Public Internet Platforms Using Model-Based Format-Transforming Encryption}, journal = {CoRR}, volume = {abs/2110.07009}, year = {2021}, url = {https://arxiv.org/abs/2110.07009}, eprinttype = {arXiv}, eprint = {2110.07009}, timestamp = {Fri, 22 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2110-07009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CampanelliDKKN21, author = {Matteo Campanelli and Bernardo David and Hamidreza Khoshakhlagh and Anders K. Kristensen and Jesper Buus Nielsen}, title = {Encryption to the Future: {A} Paradigm for Sending Secret Messages to Future (Anonymous) Committees}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1423}, year = {2021}, url = {https://eprint.iacr.org/2021/1423}, timestamp = {Fri, 12 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/CampanelliDKKN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FanSTH21, author = {Chun{-}I Fan and Cheng{-}Han Shie and Yi{-}Fan Tseng and Hui{-}Chun Huang}, title = {An Efficient Data Protection Scheme Based on Hierarchical ID-Based Encryption for Message Queueing Telemetry Transport}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1057}, year = {2021}, url = {https://eprint.iacr.org/2021/1057}, timestamp = {Mon, 06 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FanSTH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NguyenSSWXZ21, author = {Khoa Nguyen and Reihaneh Safavi{-}Naini and Willy Susilo and Huaxiong Wang and Yanhong Xu and Neng Zeng}, title = {Group Encryption: Full Dynamicity, Message Filtering and Code-Based Instantiation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {226}, year = {2021}, url = {https://eprint.iacr.org/2021/226}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/NguyenSSWXZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/LingMHLL20, author = {Yunhao Ling and Sha Ma and Qiong Huang and Ximing Li and Yunzhi Ling}, title = {Group public key encryption with equality test against offline message recovery attack}, journal = {Inf. Sci.}, volume = {510}, pages = {16--32}, year = {2020}, url = {https://doi.org/10.1016/j.ins.2019.09.025}, doi = {10.1016/J.INS.2019.09.025}, timestamp = {Thu, 22 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/LingMHLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jihmsp/Korzhik0FM20, author = {Valery I. Korzhik and Cuong Nguyen and Ivan Fedyanin and Guillermo Morales{-}Luna}, title = {Side Attacks on Stegosystems Executing Message Encryption Previous to Embedding}, journal = {J. Inf. Hiding Multim. Signal Process.}, volume = {11}, number = {1}, pages = {44--57}, year = {2020}, url = {http://bit.kuas.edu.tw/\&\#126;jihmsp/2020/vol1/3\_jihmsp-1218.pdf}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jihmsp/Korzhik0FM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/LiangY20, author = {Min Liang and Li Yang}, title = {Block encryption of quantum messages}, journal = {Quantum Inf. Process.}, volume = {19}, number = {4}, pages = {111}, year = {2020}, url = {https://doi.org/10.1007/s11128-020-2612-z}, doi = {10.1007/S11128-020-2612-Z}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/LiangY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiuZZHL20, author = {Hui Liu and Bo Zhao and Jianwen Zou and Linquan Huang and Yifan Liu}, title = {A Lightweight Image Encryption Algorithm Based on Message Passing and Chaotic Map}, journal = {Secur. Commun. Networks}, volume = {2020}, pages = {7151836:1--7151836:12}, year = {2020}, url = {https://doi.org/10.1155/2020/7151836}, doi = {10.1155/2020/7151836}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LiuZZHL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tbc/ChenLZ20, author = {Liqing Chen and Jiguo Li and Yichen Zhang}, title = {Anonymous Certificate-Based Broadcast Encryption With Personalized Messages}, journal = {{IEEE} Trans. Broadcast.}, volume = {66}, number = {4}, pages = {867--881}, year = {2020}, url = {https://doi.org/10.1109/TBC.2020.2984974}, doi = {10.1109/TBC.2020.2984974}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tbc/ChenLZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/webology/DeviMK20, author = {T. Kirthiga Devi and R. Mohanakrishnan and T. Karthick}, title = {Secure Message Broadcasting in {VANET} Using {RSU} based Authentication and Cascade Encryption}, journal = {Webology}, volume = {17}, number = {2}, pages = {706--716}, year = {2020}, url = {https://doi.org/10.14704/web/v17i2/web17062}, doi = {10.14704/WEB/V17I2/WEB17062}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/webology/DeviMK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisis-spain/SalazarSFRA20, author = {Jos{\'{e}} Luis Salazar and Jose Saldana and Juli{\'{a}}n Fern{\'{a}}ndez{-}Navajas and Jos{\'{e}} Ru{\'{\i}}z{-}Mas and Guillermo Azuara}, editor = {{\'{A}}lvaro Herrero and Carlos Cambra and Daniel Urda and Javier Sedano and H{\'{e}}ctor Quinti{\'{a}}n and Emilio Corchado}, title = {Short Message Multichannel Broadcast Encryption}, booktitle = {13th International Conference on Computational Intelligence in Security for Information Systems, {CISIS} 2020, Burgos, Spain, September 2020}, series = {Advances in Intelligent Systems and Computing}, volume = {1267}, pages = {122--131}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-57805-3\_12}, doi = {10.1007/978-3-030-57805-3\_12}, timestamp = {Mon, 13 Feb 2023 21:54:28 +0100}, biburl = {https://dblp.org/rec/conf/cisis-spain/SalazarSFRA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ficta/GoyalPRRK20, author = {Saloni Goyal and Balie Shalomi Pacholi and B. Ashwath Rao and Shwetha Rai and N. Gopalakrishna Kini}, editor = {Vikrant Bhateja and Sheng{-}Lung Peng and Suresh Chandra Satapathy and Yu{-}Dong Zhang}, title = {Parallel Message Encryption Through Playfair Cipher Using {CUDA}}, booktitle = {Evolution in Computational Intelligence - Frontiers in Intelligent Computing: Theory and Applications {(FICTA} 2020), Volume 1, Karnataka, Surathkal, India, January 4-5, 2020}, series = {Advances in Intelligent Systems and Computing}, volume = {1176}, pages = {519--526}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-15-5788-0\_50}, doi = {10.1007/978-981-15-5788-0\_50}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ficta/GoyalPRRK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-15985, author = {Kunjal Panchal}, title = {Differential Privacy and Natural Language Processing to Generate Contextually Similar Decoy Messages in Honey Encryption Scheme}, journal = {CoRR}, volume = {abs/2010.15985}, year = {2020}, url = {https://arxiv.org/abs/2010.15985}, eprinttype = {arXiv}, eprint = {2010.15985}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-15985.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Goncharov20, author = {Sergij V. Goncharov}, title = {On (impracticality of) transfinite symmetric encryption with keys smaller than messages under {GCH}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {715}, year = {2020}, url = {https://eprint.iacr.org/2020/715}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Goncharov20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KounavisDDMW20, author = {Michael E. Kounavis and David Durham and Sergej Deutsch and Krystian Matusiewicz and David Wheeler}, title = {The {MAGIC} Mode for Simultaneously Supporting Encryption, Message Authentication and Error Correction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1460}, year = {2020}, url = {https://eprint.iacr.org/2020/1460}, timestamp = {Wed, 02 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/KounavisDDMW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/YangFW20, title = {Encryption scheme with mixed homomorphic signature based on message authentication for digital image}, journal = {J. Supercomput.}, volume = {76}, number = {2}, pages = {1201--1211}, year = {2020}, note = {Withdrawn.}, url = {https://doi.org/10.1007/s11227-018-2528-x}, doi = {10.1007/S11227-018-2528-X}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tjs/YangFW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcm/Abdulhameed19, author = {Zainab N. Abdulhameed}, title = {Transmission of an Encryption Audio Message Using Chaotic Map in a Noisy Channel}, journal = {J. Commun.}, volume = {14}, number = {2}, pages = {142--147}, year = {2019}, url = {https://doi.org/10.12720/jcm.14.2.142-147}, doi = {10.12720/JCM.14.2.142-147}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcm/Abdulhameed19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/OhKYL19, author = {Insu Oh and Taeeun Kim and Kangbin Yim and Sun{-}Young Lee}, title = {A Novel Message-Preserving Scheme with Format-Preserving Encryption for Connected Cars in Multi-Access Edge Computing}, journal = {Sensors}, volume = {19}, number = {18}, pages = {3869}, year = {2019}, url = {https://doi.org/10.3390/s19183869}, doi = {10.3390/S19183869}, timestamp = {Sat, 30 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/OhKYL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PanLLN19, author = {Dongxue Pan and Bei Liang and Hongda Li and Peifang Ni}, editor = {Julian Jang{-}Jaccard and Fuchun Guo}, title = {Witness Encryption with (Weak) Unique Decryption and Message Indistinguishability: Constructions and Applications}, booktitle = {Information Security and Privacy - 24th Australasian Conference, {ACISP} 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11547}, pages = {609--619}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21548-4\_33}, doi = {10.1007/978-3-030-21548-4\_33}, timestamp = {Mon, 12 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PanLLN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/0001LPR0V19, author = {Elena Andreeva and Virginie Lallemand and Antoon Purnal and Reza Reyhanitabar and Arnab Roy and Damian Viz{\'{a}}r}, editor = {Steven D. Galbraith and Shiho Moriai}, title = {Forkcipher: {A} New Primitive for Authenticated Encryption of Very Short Messages}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11922}, pages = {153--182}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34621-8\_6}, doi = {10.1007/978-3-030-34621-8\_6}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/0001LPR0V19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/TyagiGLMR19, author = {Nirvan Tyagi and Paul Grubbs and Julia Len and Ian Miers and Thomas Ristenpart}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Asymmetric Message Franking: Content Moderation for Metadata-Private End-to-End Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11694}, pages = {222--250}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26954-8\_8}, doi = {10.1007/978-3-030-26954-8\_8}, timestamp = {Fri, 09 Aug 2019 14:27:02 +0200}, biburl = {https://dblp.org/rec/conf/crypto/TyagiGLMR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kse/LuangoudomNTN19, author = {Sonxay Luangoudom and Tuyen Nguyen and Duc Tran and Linh Giang Nguyen}, title = {End to end message encryption using Poly1305 and XSalsa20 in Low power and Lossy Networks}, booktitle = {11th International Conference on Knowledge and Systems Engineering, {KSE} 2019, Da Nang, Vietnam, October 24-26, 2019}, pages = {1--5}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/KSE.2019.8919479}, doi = {10.1109/KSE.2019.8919479}, timestamp = {Thu, 30 Jan 2020 15:40:00 +0100}, biburl = {https://dblp.org/rec/conf/kse/LuangoudomNTN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AndreevaLPRRV19, author = {Elena Andreeva and Virginie Lallemand and Antoon Purnal and Reza Reyhanitabar and Arnab Roy and Damian Viz{\'{a}}r}, title = {Forkcipher: a New Primitive for Authenticated Encryption of Very Short Messages}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1004}, year = {2019}, url = {https://eprint.iacr.org/2019/1004}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AndreevaLPRRV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TyagiGLMR19, author = {Nirvan Tyagi and Paul Grubbs and Julia Len and Ian Miers and Thomas Ristenpart}, title = {Asymmetric Message Franking: Content Moderation for Metadata-Private End-to-End Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {565}, year = {2019}, url = {https://eprint.iacr.org/2019/565}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TyagiGLMR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fiict/LeraOBHL18, author = {Francisco J. Rodr{\'{\i}}guez{-}Lera and Vicente Matell{\'{a}}n Olivera and Jes{\'{u}}s Balsa{-}Comer{\'{o}}n and {\'{A}}ngel Manuel Guerrero{-}Higueras and Camino Fern{\'{a}}ndez Llamas}, title = {Message Encryption in Robot Operating System: Collateral Effects of Hardening Mobile Robots}, journal = {Frontiers {ICT}}, volume = {5}, pages = {2}, year = {2018}, url = {https://doi.org/10.3389/fict.2018.00002}, doi = {10.3389/FICT.2018.00002}, timestamp = {Thu, 25 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fiict/LeraOBHL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/WangCLYW18, author = {Huige Wang and Kefei Chen and Yu Long and Junyao Ye and Liangliang Wang}, title = {A new randomized message-locked encryption in the standard model}, journal = {Peer-to-Peer Netw. Appl.}, volume = {11}, number = {2}, pages = {298--308}, year = {2018}, url = {https://doi.org/10.1007/s12083-016-0488-6}, doi = {10.1007/S12083-016-0488-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/WangCLYW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/AminifarEP18, author = {Amir Aminifar and Petru Eles and Zebo Peng}, title = {Optimization of Message Encryption for Real-Time Applications in Embedded Systems}, journal = {{IEEE} Trans. Computers}, volume = {67}, number = {5}, pages = {748--754}, year = {2018}, url = {https://doi.org/10.1109/TC.2017.2778728}, doi = {10.1109/TC.2017.2778728}, timestamp = {Fri, 11 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/AminifarEP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/YounJC18, author = {Taek{-}Young Youn and Nam{-}Su Jho and Ku{-}Young Chang}, title = {Design of additive homomorphic encryption with multiple message spaces for secure and practical storage services over encrypted data}, journal = {J. Supercomput.}, volume = {74}, number = {8}, pages = {3620--3638}, year = {2018}, url = {https://doi.org/10.1007/s11227-016-1796-6}, doi = {10.1007/S11227-016-1796-6}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/YounJC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/KandeleP18, author = {Suyash Kandele and Souradyuti Paul}, editor = {Bart Preneel and Frederik Vercauteren}, title = {Message-Locked Encryption with File Update}, booktitle = {Applied Cryptography and Network Security - 16th International Conference, {ACNS} 2018, Leuven, Belgium, July 2-4, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10892}, pages = {678--695}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93387-0\_35}, doi = {10.1007/978-3-319-93387-0\_35}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/acns/KandeleP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/SaarinenBGRTZ18, author = {Markku{-}Juhani O. Saarinen and Sauvik Bhattacharya and {\'{O}}scar Garc{\'{\i}}a{-}Morch{\'{o}}n and Ronald Rietman and Ludo Tolhuizen and Zhenfei Zhang}, editor = {Beg{\"{u}}l Bilgin and Jean{-}Bernard Fischer}, title = {Shorter Messages and Faster Post-Quantum Encryption with Round5 on Cortex {M}}, booktitle = {Smart Card Research and Advanced Applications, 17th International Conference, {CARDIS} 2018, Montpellier, France, November 12-14, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11389}, pages = {95--110}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-15462-2\_7}, doi = {10.1007/978-3-030-15462-2\_7}, timestamp = {Sat, 30 Sep 2023 09:35:52 +0200}, biburl = {https://dblp.org/rec/conf/cardis/SaarinenBGRTZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/IsobeM18, author = {Takanori Isobe and Kazuhiko Minematsu}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Breaking Message Integrity of an End-to-End Encryption Scheme of {LINE}}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11099}, pages = {249--268}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98989-1\_13}, doi = {10.1007/978-3-319-98989-1\_13}, timestamp = {Fri, 03 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/IsobeM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LingMHL18, author = {Yunhao Ling and Sha Ma and Qiong Huang and Ximing Li}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {A General Two-Server Framework for Ciphertext-Checkable Encryption Against Offline Message Recovery Attack}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {370--382}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_34}, doi = {10.1007/978-3-030-00012-7\_34}, timestamp = {Thu, 22 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/LingMHL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsp/SongHZ18, author = {Wei{-}Tao Song and Bin Hu and Xiu{-}Feng Zhao}, title = {Multi-bit Leveled Homomorphic Encryption of Message Matrices}, booktitle = {Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, {ICCSP} 2018, Guiyang, China, March 16-19, 2018}, pages = {45--50}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3199478.3199501}, doi = {10.1145/3199478.3199501}, timestamp = {Mon, 15 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsp/SongHZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/ZhangT18, author = {Rui Zhang and Yang Tao}, editor = {David Naccache and Shouhuai Xu and Sihan Qing and Pierangela Samarati and Gregory Blanc and Rongxing Lu and Zonghua Zhang and Ahmed Meddahi}, title = {Key Dependent Message Security for Revocable Identity-Based Encryption and Identity-Based Encryption}, booktitle = {Information and Communications Security - 20th International Conference, {ICICS} 2018, Lille, France, October 29-31, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11149}, pages = {426--441}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01950-1\_25}, doi = {10.1007/978-3-030-01950-1\_25}, timestamp = {Mon, 01 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/ZhangT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DottlingGHM18, author = {Nico D{\"{o}}ttling and Sanjam Garg and Mohammad Hajiabadi and Daniel Masny}, editor = {Michel Abdalla and Ricardo Dahab}, title = {New Constructions of Identity-Based and Key-Dependent Message Secure Encryption Schemes}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10769}, pages = {3--31}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76578-5\_1}, doi = {10.1007/978-3-319-76578-5\_1}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DottlingGHM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KitagawaT18, author = {Fuyuki Kitagawa and Keisuke Tanaka}, editor = {Michel Abdalla and Ricardo Dahab}, title = {Key Dependent Message Security and Receiver Selective Opening Security for Identity-Based Encryption}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10769}, pages = {32--61}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76578-5\_2}, doi = {10.1007/978-3-319-76578-5\_2}, timestamp = {Fri, 13 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/KitagawaT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1812-06050, author = {Min Liang and Li Yang}, title = {Block encryption of quantum messages}, journal = {CoRR}, volume = {abs/1812.06050}, year = {2018}, url = {http://arxiv.org/abs/1812.06050}, eprinttype = {arXiv}, eprint = {1812.06050}, timestamp = {Tue, 01 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1812-06050.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AndreevaRVV18, author = {Elena Andreeva and Reza Reyhanitabar and Kerem Varici and Damian Viz{\'{a}}r}, title = {Forking a Blockcipher for Authenticated Encryption of Very Short Messages}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {916}, year = {2018}, url = {https://eprint.iacr.org/2018/916}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AndreevaRVV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IsobeM18, author = {Takanori Isobe and Kazuhiko Minematsu}, title = {Breaking Message Integrity of an End-to-End Encryption Scheme of {LINE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {668}, year = {2018}, url = {https://eprint.iacr.org/2018/668}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IsobeM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KandeleP18, author = {Suyash Kandele and Souradyuti Paul}, title = {Message-locked Encryption with File Update}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {422}, year = {2018}, url = {https://eprint.iacr.org/2018/422}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KandeleP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SaarinenBGRTZ18, author = {Markku{-}Juhani O. Saarinen and Sauvik Bhattacharya and {\'{O}}scar Garc{\'{\i}}a{-}Morch{\'{o}}n and Ronald Rietman and Ludo Tolhuizen and Zhenfei Zhang}, title = {Shorter Messages and Faster Post-Quantum Encryption with Round5 on Cortex {M}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {723}, year = {2018}, url = {https://eprint.iacr.org/2018/723}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SaarinenBGRTZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/WangCQLW17, author = {Huige Wang and Kefei Chen and Baodong Qin and Xuejia Lai and Yunhua Wen}, title = {A new construction on randomized message-locked encryption in the standard model via UCEs}, journal = {Sci. China Inf. Sci.}, volume = {60}, number = {5}, pages = {52101}, year = {2017}, url = {https://doi.org/10.1007/s11432-015-1037-2}, doi = {10.1007/S11432-015-1037-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/WangCQLW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/ChenMMS17, author = {Jiageng Chen and Rashed Mazumder and Atsuko Miyaji and Chunhua Su}, title = {Variable message encryption through blockcipher compression function}, journal = {Concurr. Comput. Pract. Exp.}, volume = {29}, number = {7}, year = {2017}, url = {https://doi.org/10.1002/cpe.3956}, doi = {10.1002/CPE.3956}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/ChenMMS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/BansalCS17, author = {Tarun Kumar Bansal and Donghoon Chang and Somitra Kumar Sanadhya}, title = {Sponge-based {CCA2} secure asymmetric encryption for arbitrary length message (extended version)}, journal = {Int. J. Appl. Cryptogr.}, volume = {3}, number = {3}, pages = {262--287}, year = {2017}, url = {https://doi.org/10.1504/IJACT.2017.10007290}, doi = {10.1504/IJACT.2017.10007290}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/BansalCS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijst/GhasemzadehE17, author = {Ardalan Ghasemzadeh and Elham Esmaeili}, title = {A novel method in audio message encryption based on a mixture of chaos function}, journal = {Int. J. Speech Technol.}, volume = {20}, number = {4}, pages = {829--837}, year = {2017}, url = {https://doi.org/10.1007/s10772-017-9452-y}, doi = {10.1007/S10772-017-9452-Y}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijst/GhasemzadehE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/WatanabeSM17, author = {Dai Watanabe and Hisao Sakazaki and Kunihiko Miyazaki}, title = {Representative System and Security Message Transmission using Re-encryption Scheme Based on Symmetric-key Cryptography}, journal = {J. Inf. Process.}, volume = {25}, pages = {67--74}, year = {2017}, url = {https://doi.org/10.2197/ipsjjip.25.67}, doi = {10.2197/IPSJJIP.25.67}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jip/WatanabeSM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/HuangZW17, author = {Ke Huang and Xiaosong Zhang and Xiao{-}Fen Wang}, title = {Block-Level Message-Locked Encryption with Polynomial Commitment for IoT Data}, journal = {J. Inf. Sci. Eng.}, volume = {33}, number = {4}, pages = {891--905}, year = {2017}, url = {https://jise.iis.sinica.edu.tw/JISESearch/pages/View/PaperView.jsf?keyId=157\_2047}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/HuangZW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AgrawalC17, author = {Shashank Agrawal and Melissa Chase}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{FAME:} Fast Attribute-based Message Encryption}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {665--682}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134014}, doi = {10.1145/3133956.3134014}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AgrawalC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhaoC17, author = {Yongjun Zhao and Sherman S. M. Chow}, editor = {Ramesh Karri and Ozgur Sinanoglu and Ahmad{-}Reza Sadeghi and Xun Yi}, title = {Updatable Block-Level Message-Locked Encryption}, booktitle = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017}, pages = {449--460}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3052973.3053012}, doi = {10.1145/3052973.3053012}, timestamp = {Sun, 12 Nov 2023 02:11:41 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhaoC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/WuHZZ17, author = {Xuguang Wu and Yiliang Han and Minqing Zhang and Shuaishuai Zhu}, editor = {Xiaofeng Chen and Dongdai Lin and Moti Yung}, title = {Parallel Long Messages Encryption Scheme Based on Certificateless Cryptosystem for Big Data}, booktitle = {Information Security and Cryptology - 13th International Conference, Inscrypt 2017, Xi'an, China, November 3-5, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10726}, pages = {211--222}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-75160-3\_14}, doi = {10.1007/978-3-319-75160-3\_14}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/WuHZZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ciss/MazumderMS17, author = {Rashed Mazumder and Atsuko Miyaji and Chunhua Su}, title = {A simple construction of encryption for a tiny domain message}, booktitle = {51st Annual Conference on Information Sciences and Systems, {CISS} 2017, Baltimore, MD, USA, March 22-24, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CISS.2017.7926080}, doi = {10.1109/CISS.2017.7926080}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/ciss/MazumderMS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GrubbsLR17, author = {Paul Grubbs and Jiahui Lu and Thomas Ristenpart}, editor = {Jonathan Katz and Hovav Shacham}, title = {Message Franking via Committing Authenticated Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10403}, pages = {66--97}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63697-9\_3}, doi = {10.1007/978-3-319-63697-9\_3}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GrubbsLR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/FurutaYKEIF17, author = {Yuuji Furuta and Naoto Yanai and Masashi Karasaki and Katsuhiko Eguchi and Yasunori Ishihara and Toru Fujiwara}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Guillermo Navarro{-}Arribas and Hannes Hartenstein and Jordi Herrera{-}Joancomart{\'{\i}}}, title = {Towards Efficient and Secure Encrypted Databases: Extending Message-Locked Encryption in Three-Party Model}, booktitle = {Data Privacy Management, Cryptocurrencies and Blockchain Technology - {ESORICS} 2017 International Workshops, {DPM} 2017 and {CBT} 2017, Oslo, Norway, September 14-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10436}, pages = {55--69}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-67816-0\_4}, doi = {10.1007/978-3-319-67816-0\_4}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/FurutaYKEIF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fruct/KorzhikFC17, author = {Valery I. Korzhik and Ivan Fedyanin and Cuong Nguyen}, title = {Detection of stegosystems using block ciphers for encryption of the embedded messages}, booktitle = {20th Conference of Open Innovations Association, {FRUCT} 2017, St. Petersburg, Russia, April 3-7, 2017}, pages = {181--186}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/FRUCT.2017.8071309}, doi = {10.23919/FRUCT.2017.8071309}, timestamp = {Mon, 16 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fruct/KorzhikFC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/AcharyaD17, author = {Kamalesh Acharya and Ratna Dutta}, editor = {Tatsuaki Okamoto and Yong Yu and Man Ho Au and Yannan Li}, title = {Provable Secure Constructions for Broadcast Encryption with Personalized Messages}, booktitle = {Provable Security - 11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10592}, pages = {329--348}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68637-0\_20}, doi = {10.1007/978-3-319-68637-0\_20}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/provsec/AcharyaD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalC17a, author = {Shashank Agrawal and Melissa Chase}, title = {{FAME:} Fast Attribute-based Message Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {807}, year = {2017}, url = {http://eprint.iacr.org/2017/807}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalC17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DottlingGHM17, author = {Nico D{\"{o}}ttling and Sanjam Garg and Mohammad Hajiabadi and Daniel Masny}, title = {New Constructions of Identity-Based and Key-Dependent Message Secure Encryption Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {978}, year = {2017}, url = {http://eprint.iacr.org/2017/978}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DottlingGHM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrubbsLR17, author = {Paul Grubbs and Jiahui Lu and Thomas Ristenpart}, title = {Message Franking via Committing Authenticated Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {664}, year = {2017}, url = {http://eprint.iacr.org/2017/664}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GrubbsLR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KitagawaT17, author = {Fuyuki Kitagawa and Keisuke Tanaka}, title = {Key Dependent Message Security and Receiver Selective Opening Security for Identity-Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {987}, year = {2017}, url = {http://eprint.iacr.org/2017/987}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KitagawaT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiangY17, author = {Min Liang and Li Yang}, title = {Block encryption of quantum messages}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1247}, year = {2017}, url = {http://eprint.iacr.org/2017/1247}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiangY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuL17, author = {Fanbao Liu and Fengmei Liu}, title = {Universal Forgery with Birthday Paradox: Application to Blockcipher-based Message Authentication Codes and Authenticated Encryptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {653}, year = {2017}, url = {http://eprint.iacr.org/2017/653}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc8103, author = {Russell Housley}, title = {Using ChaCha20-Poly1305 Authenticated Encryption in the Cryptographic Message Syntax {(CMS)}}, journal = {{RFC}}, volume = {8103}, pages = {1--9}, year = {2017}, url = {https://doi.org/10.17487/RFC8103}, doi = {10.17487/RFC8103}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc8103.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc8230, author = {Michael B. Jones}, title = {Using {RSA} Algorithms with {CBOR} Object Signing and Encryption {(COSE)} Messages}, journal = {{RFC}}, volume = {8230}, pages = {1--12}, year = {2017}, url = {https://doi.org/10.17487/RFC8230}, doi = {10.17487/RFC8230}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc8230.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc8291, author = {Martin Thomson}, title = {Message Encryption for Web Push}, journal = {{RFC}}, volume = {8291}, pages = {1--13}, year = {2017}, url = {https://doi.org/10.17487/RFC8291}, doi = {10.17487/RFC8291}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc8291.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/basesearch/Luykx16, author = {Atul Luykx}, title = {The Design and Analysis of Message Authentication and Authenticated Encryption Schemes ; Ontwerp en analyse van berichtverificatie- en geverifieerde encryptieschema's}, school = {Katholieke Universiteit Leuven, Belgium}, year = {2016}, url = {https://lirias.kuleuven.be/handle/123456789/539700}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/phd/basesearch/Luykx16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/ca/Hajiabadi16, author = {Mohammad Hajiabadi}, title = {Encryption security against key-dependent-message attacks: applications, realizations and separations}, school = {University of Victoria, Canada}, year = {2016}, url = {http://hdl.handle.net/1828/7454}, timestamp = {Fri, 05 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/ca/Hajiabadi16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cai/Villanyi16, author = {Vikt{\'{o}}ria I. Vill{\'{a}}nyi}, title = {Simple Multi-Authority Attribute-Based Encryption for Short Messages}, journal = {Comput. Informatics}, volume = {35}, number = {1}, pages = {128--142}, year = {2016}, url = {http://www.cai.sk/ojs/index.php/cai/article/view/1318}, timestamp = {Mon, 14 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cai/Villanyi16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/Sasaki016a, author = {Yu Sasaki and Lei Wang}, title = {Message Extension Attack against Authenticated Encryptions: Application to {PANDA}}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {99-A}, number = {1}, pages = {49--57}, year = {2016}, url = {https://doi.org/10.1587/transfun.E99.A.49}, doi = {10.1587/TRANSFUN.E99.A.49}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/Sasaki016a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/Dottling16, author = {Nico D{\"{o}}ttling}, title = {Low Noise {LPN:} Key dependent message secure public key encryption an sample amplification}, journal = {{IET} Inf. Secur.}, volume = {10}, number = {6}, pages = {372--385}, year = {2016}, url = {https://doi.org/10.1049/iet-ifs.2015.0495}, doi = {10.1049/IET-IFS.2015.0495}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/Dottling16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/JiangCWMSL16, author = {Tao Jiang and Xiaofeng Chen and Qianhong Wu and Jianfeng Ma and Willy Susilo and Wenjing Lou}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Towards Efficient Fully Randomized Message-Locked Encryption}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9722}, pages = {361--375}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40253-6\_22}, doi = {10.1007/978-3-319-40253-6\_22}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/JiangCWMSL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/GoyalJO16, author = {Vipul Goyal and Aayush Jain and Adam O'Neill}, editor = {Jung Hee Cheon and Tsuyoshi Takagi}, title = {Multi-input Functional Encryption with Unbounded-Message Security}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10032}, pages = {531--556}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53890-6\_18}, doi = {10.1007/978-3-662-53890-6\_18}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/GoyalJO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/CanardLP16, author = {S{\'{e}}bastien Canard and Fabien Laguillaumie and Marie Paindavoine}, editor = {Sara Foresti and Giuseppe Persiano}, title = {Verifiable Message-Locked Encryption}, booktitle = {Cryptology and Network Security - 15th International Conference, {CANS} 2016, Milan, Italy, November 14-16, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10052}, pages = {299--315}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48965-0\_18}, doi = {10.1007/978-3-319-48965-0\_18}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/cans/CanardLP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BellareHT16, author = {Mihir Bellare and Viet Tung Hoang and Stefano Tessaro}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {Message-Recovery Attacks on Feistel-Based Format Preserving Encryption}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {444--455}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2978390}, doi = {10.1145/2976749.2978390}, timestamp = {Tue, 10 Nov 2020 20:00:49 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BellareHT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/JaegerRT16, author = {Joseph Jaeger and Thomas Ristenpart and Qiang Tang}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Honey Encryption Beyond Message Recovery Security}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9665}, pages = {758--788}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49890-3\_29}, doi = {10.1007/978-3-662-49890-3\_29}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/JaegerRT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/GhassamiCK16, author = {AmirEmad Ghassami and Daniel F. Cullina and Negar Kiyavash}, title = {Message partitioning and limited auxiliary randomness: Alternatives to Honey Encryption}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2016, Barcelona, Spain, July 10-15, 2016}, pages = {1371--1375}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISIT.2016.7541523}, doi = {10.1109/ISIT.2016.7541523}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isit/GhassamiCK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/SteefSA16, author = {Ahmad Steef and Mohammad Nur Shamma and A. Alkhatib}, title = {{RSA} algorithm with a new approach encryption and decryption message text by ascii}, journal = {CoRR}, volume = {abs/1610.08832}, year = {2016}, url = {http://arxiv.org/abs/1610.08832}, eprinttype = {arXiv}, eprint = {1610.08832}, timestamp = {Thu, 02 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/SteefSA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareHT16, author = {Mihir Bellare and Viet Tung Hoang and Stefano Tessaro}, title = {Message-recovery attacks on Feistel-based Format Preserving Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {794}, year = {2016}, url = {http://eprint.iacr.org/2016/794}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareHT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JaegerRT16, author = {Joseph Jaeger and Thomas Ristenpart and Qiang Tang}, title = {Honey Encryption Beyond Message Recovery Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {174}, year = {2016}, url = {http://eprint.iacr.org/2016/174}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JaegerRT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/ethos/Davies15, author = {Gareth T. Davies}, title = {Encryption in the presence of key-dependent messages and related-key attacks}, school = {University of Bristol, {UK}}, year = {2015}, url = {https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.688349}, timestamp = {Tue, 05 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/ethos/Davies15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijitwe/ChenHLJW15, author = {Hu Chen and Yupu Hu and Zhizhu Lian and Huiwen Jia and Xu An Wang}, title = {An Additively Homomorphic Encryption over Large Message Space}, journal = {Int. J. Inf. Technol. Web Eng.}, volume = {10}, number = {3}, pages = {82--102}, year = {2015}, url = {https://doi.org/10.4018/IJITWE.2015070106}, doi = {10.4018/IJITWE.2015070106}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijitwe/ChenHLJW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LaiHCWW15, author = {Qiqi Lai and Yupu Hu and Yuan Chen and Baocang Wang and Fenghe Wang}, title = {New method of key-dependent message security for asymmetric encryption}, journal = {Secur. Commun. Networks}, volume = {8}, number = {13}, pages = {2157--2170}, year = {2015}, url = {https://doi.org/10.1002/sec.1160}, doi = {10.1002/SEC.1160}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LaiHCWW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChenMYG15, author = {Rongmao Chen and Yi Mu and Guomin Yang and Fuchun Guo}, title = {{BL-MLE:} Block-Level Message-Locked Encryption for Secure Large File Deduplication}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {12}, pages = {2643--2652}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2470221}, doi = {10.1109/TIFS.2015.2470221}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChenMYG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BansalCS15, author = {Tarun Kumar Bansal and Donghoon Chang and Somitra Kumar Sanadhya}, editor = {Ernest Foo and Douglas Stebila}, title = {Sponge Based {CCA2} Secure Asymmetric Encryption for Arbitrary Length Message}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {93--106}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_6}, doi = {10.1007/978-3-319-19962-7\_6}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BansalCS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/NuidaK15, author = {Koji Nuida and Kaoru Kurosawa}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {(Batch) Fully Homomorphic Encryption over Integers for Non-Binary Message Spaces}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9056}, pages = {537--555}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46800-5\_21}, doi = {10.1007/978-3-662-46800-5\_21}, timestamp = {Thu, 14 Oct 2021 09:58:16 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/NuidaK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BellareK15, author = {Mihir Bellare and Sriram Keelveedhi}, editor = {Jonathan Katz}, title = {Interactive Message-Locked Encryption and Secure Deduplication}, booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, pages = {516--538}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2\_23}, doi = {10.1007/978-3-662-46447-2\_23}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BellareK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/RuotiAMZS15, author = {Scott Ruoti and Jeff Andersen and Tyler Monson and Daniel Zappala and Kent E. Seamons}, title = {MessageGuard: {A} Browser-based Platform for Usable, Content-Based Encryption Research}, journal = {CoRR}, volume = {abs/1510.08943}, year = {2015}, url = {http://arxiv.org/abs/1510.08943}, eprinttype = {arXiv}, eprint = {1510.08943}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/RuotiAMZS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbadiBMRS15, author = {Mart{\'{\i}}n Abadi and Dan Boneh and Ilya Mironov and Ananth Raghunathan and Gil Segev}, title = {Message-Locked Encryption for Lock-Dependent Messages}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {440}, year = {2015}, url = {http://eprint.iacr.org/2015/440}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbadiBMRS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BansalCS15, author = {Tarun Kumar Bansal and Donghoon Chang and Somitra Kumar Sanadhya}, title = {Sponge based {CCA2} secure asymmetric encryption for arbitrary length message}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {330}, year = {2015}, url = {http://eprint.iacr.org/2015/330}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BansalCS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareK15, author = {Mihir Bellare and Sriram Keelveedhi}, title = {Interactive Message-Locked Encryption and Secure Deduplication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {52}, year = {2015}, url = {http://eprint.iacr.org/2015/052}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoyalJO15, author = {Vipul Goyal and Aayush Jain and Adam O'Neill}, title = {Multi-Input Functional Encryption with Unbounded-Message Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1113}, year = {2015}, url = {http://eprint.iacr.org/2015/1113}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoyalJO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/us/Ravinarayanan14, author = {Sriram Keelveedhi}, title = {Encryption when messages and keys are related /}, school = {University of California, San Diego, {USA}}, year = {2014}, url = {https://www.escholarship.org/uc/item/41j945st}, timestamp = {Wed, 15 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/us/Ravinarayanan14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/LaiCHWJ14, author = {Qiqi Lai and Yuan Chen and Yupu Hu and Baocang Wang and Mingming Jiang}, title = {Construction of a key-dependent message secure symmetric encryption scheme in the ideal cipher model}, journal = {Frontiers Comput. Sci.}, volume = {8}, number = {3}, pages = {469--477}, year = {2014}, url = {https://doi.org/10.1007/s11704-014-3062-5}, doi = {10.1007/S11704-014-3062-5}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fcsc/LaiCHWJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/SasakiW14, author = {Yu Sasaki and Lei Wang}, editor = {Dimitris Gritzalis and Aggelos Kiayias and Ioannis G. Askoxylakis}, title = {Message Extension Attack against Authenticated Encryptions: Application to {PANDA}}, booktitle = {Cryptology and Network Security - 13th International Conference, {CANS} 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8813}, pages = {82--97}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12280-9\_6}, doi = {10.1007/978-3-319-12280-9\_6}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/cans/SasakiW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BlazyKP14, author = {Olivier Blazy and Eike Kiltz and Jiaxin Pan}, editor = {Juan A. Garay and Rosario Gennaro}, title = {(Hierarchical) Identity-Based Encryption from Affine Message Authentication}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8616}, pages = {408--425}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44371-2\_23}, doi = {10.1007/978-3-662-44371-2\_23}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BlazyKP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyberc/ChenZW14, author = {Zhen Chen and Wenfang Zhang and Xiaomin Wang}, title = {A Robust Collaborative Threshold Authenticated Encryption Scheme Based on Message Blocking}, booktitle = {2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2014, Shanghai, China, October 13-15, 2014}, pages = {10--13}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CyberC.2014.12}, doi = {10.1109/CYBERC.2014.12}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyberc/ChenZW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyberc/ChenZW14a, author = {Zhen Chen and Wenfang Zhang and Xiaomin Wang}, title = {A Robust Collaborative Threshold Authenticated Encryption Scheme Based on Message Blocking}, booktitle = {2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2014, Shanghai, China, October 13-15, 2014}, pages = {27--30}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CyberC.2014.15}, doi = {10.1109/CYBERC.2014.15}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyberc/ChenZW14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BohlDH14, author = {Florian B{\"{o}}hl and Gareth T. Davies and Dennis Hofheinz}, editor = {Hugo Krawczyk}, title = {Encryption Schemes Secure under Related-Key and Key-Dependent Message Attacks}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {483--500}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_28}, doi = {10.1007/978-3-642-54631-0\_28}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BohlDH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/DodisF14, author = {Yevgeniy Dodis and Dario Fiore}, editor = {Michel Abdalla and Roberto De Prisco}, title = {Interactive Encryption and Message Authentication}, booktitle = {Security and Cryptography for Networks - 9th International Conference, {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8642}, pages = {494--513}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10879-7\_28}, doi = {10.1007/978-3-319-10879-7\_28}, timestamp = {Thu, 23 Jun 2022 19:58:57 +0200}, biburl = {https://dblp.org/rec/conf/scn/DodisF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlazyKP14, author = {Olivier Blazy and Eike Kiltz and Jiaxin Pan}, title = {(Hierarchical) Identity-Based Encryption from Affine Message Authentication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {581}, year = {2014}, url = {http://eprint.iacr.org/2014/581}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlazyKP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NuidaK14, author = {Koji Nuida and Kaoru Kurosawa}, title = {(Batch) Fully Homomorphic Encryption over Integers for Non-Binary Message Spaces}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {777}, year = {2014}, url = {http://eprint.iacr.org/2014/777}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NuidaK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/HanPL13, author = {Jin Ho Han and Jong Hwan Park and Dong Hoon Lee}, title = {Transmission-Efficient Broadcast Encryption Scheme with Personalized Messages}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {96-A}, number = {4}, pages = {796--806}, year = {2013}, url = {https://doi.org/10.1587/transfun.E96.A.796}, doi = {10.1587/TRANSFUN.E96.A.796}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/HanPL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/SakaiEHKO13, author = {Yusuke Sakai and Keita Emura and Goichiro Hanaoka and Yutaka Kawai and Kazumasa Omote}, title = {Methods for Restricting Message Space in Public-Key Encryption}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {96-A}, number = {6}, pages = {1156--1168}, year = {2013}, url = {https://doi.org/10.1587/transfun.E96.A.1156}, doi = {10.1587/TRANSFUN.E96.A.1156}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/SakaiEHKO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/HsuL13, author = {Chien{-}Lung Hsu and Han{-}Yu Lin}, title = {An Identity-Based Key-Insulated Encryption with Message Linkages for Peer-to-Peer Communication Network}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {7}, number = {11}, pages = {2928--2940}, year = {2013}, url = {https://doi.org/10.3837/tiis.2013.11.022}, doi = {10.3837/TIIS.2013.11.022}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/HsuL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Tang013, author = {Qiang Tang and Xiaofeng Chen}, editor = {Kefei Chen and Qi Xie and Weidong Qiu and Ninghui Li and Wen{-}Guey Tzeng}, title = {Towards asymmetric searchable encryption with message recovery and flexible search authorization}, booktitle = {8th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013}, pages = {253--264}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2484313.2484346}, doi = {10.1145/2484313.2484346}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Tang013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AbadiBMRS13, author = {Mart{\'{\i}}n Abadi and Dan Boneh and Ilya Mironov and Ananth Raghunathan and Gil Segev}, editor = {Ran Canetti and Juan A. Garay}, title = {Message-Locked Encryption for Lock-Dependent Messages}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8042}, pages = {374--391}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40041-4\_21}, doi = {10.1007/978-3-642-40041-4\_21}, timestamp = {Sun, 16 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AbadiBMRS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BellareKR13, author = {Mihir Bellare and Sriram Keelveedhi and Thomas Ristenpart}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {Message-Locked Encryption and Secure Deduplication}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {296--312}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_18}, doi = {10.1007/978-3-642-38348-9\_18}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BellareKR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisF13, author = {Yevgeniy Dodis and Dario Fiore}, title = {Interactive Encryption, Message Authentication, and Anonymous Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {817}, year = {2013}, url = {http://eprint.iacr.org/2013/817}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/informaticaLT/ChangHY12, author = {Ting Yi Chang and Min{-}Shiang Hwang and Wei{-}Pang Yang}, title = {Cryptanalysis on an Improved Version of ElGamal-Like Public-Key Encryption Scheme for Encrypting Large Messages}, journal = {Informatica}, volume = {23}, number = {4}, pages = {537--562}, year = {2012}, url = {http://content.iospress.com/articles/informatica/inf23-4-03}, timestamp = {Tue, 26 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/informaticaLT/ChangHY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/DavidaF12, author = {George I. Davida and Yair Frankel}, editor = {David Naccache}, title = {Efficient Encryption and Storage of Close Distance Messages with Applications to Cloud Storage}, booktitle = {Cryptography and Security: From Theory to Applications - Essays Dedicated to Jean-Jacques Quisquater on the Occasion of His 65th Birthday}, series = {Lecture Notes in Computer Science}, volume = {6805}, pages = {465--473}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28368-0\_29}, doi = {10.1007/978-3-642-28368-0\_29}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/birthday/DavidaF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/GalindoHV12, author = {David Galindo and Javier Herranz and Jorge L. Villar}, editor = {Sara Foresti and Moti Yung and Fabio Martinelli}, title = {Identity-Based Encryption with Master Key-Dependent Message Security and Leakage-Resilience}, booktitle = {Computer Security - {ESORICS} 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7459}, pages = {627--642}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33167-1\_36}, doi = {10.1007/978-3-642-33167-1\_36}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/GalindoHV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1203-3103, author = {Sadaqat ur Rehman and Muhammad Bilal and Basharat Ahmad and Khawaja Muhammad Yahya and Anees Ullah and Obaid Ur Rehman}, title = {Comparison Based Analysis of Different Cryptographic and Encryption Techniques Using Message Authentication Code {(MAC)} in Wireless Sensor Networks {(WSN)}}, journal = {CoRR}, volume = {abs/1203.3103}, year = {2012}, url = {http://arxiv.org/abs/1203.3103}, eprinttype = {arXiv}, eprint = {1203.3103}, timestamp = {Sat, 18 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1203-3103.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareKR12, author = {Mihir Bellare and Sriram Keelveedhi and Thomas Ristenpart}, title = {Message-Locked Encryption and Secure Deduplication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {631}, year = {2012}, url = {http://eprint.iacr.org/2012/631}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareKR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalindoHV12, author = {David Galindo and Javier Herranz and Jorge Luis Villar}, title = {Identity-Based Encryption with Master Key-Dependent Message Security and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {142}, year = {2012}, url = {http://eprint.iacr.org/2012/142}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalindoHV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Unruh12a, author = {Dominique Unruh}, title = {Programmable encryption and key-dependent messages}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {423}, year = {2012}, url = {http://eprint.iacr.org/2012/423}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Unruh12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc6476, author = {Peter Gutmann}, title = {Using Message Authentication Code {(MAC)} Encryption in the Cryptographic Message Syntax {(CMS)}}, journal = {{RFC}}, volume = {6476}, pages = {1--15}, year = {2012}, url = {https://doi.org/10.17487/RFC6476}, doi = {10.17487/RFC6476}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc6476.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijict/JenaJ11, author = {Debasish Jena and Sanjay Kumar Jena}, title = {A novel and efficient cryptosystem for large message encryption}, journal = {Int. J. Inf. Commun. Technol.}, volume = {3}, number = {1}, pages = {32--39}, year = {2011}, url = {https://doi.org/10.1504/IJICT.2011.039521}, doi = {10.1504/IJICT.2011.039521}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijict/JenaJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/umcs/OszywaG11, author = {Wojciech Oszywa and Rafal Gliwa}, title = {Combining message encryption and authentication}, journal = {Ann. {UMCS} Informatica}, volume = {11}, number = {2}, pages = {61--79}, year = {2011}, url = {https://doi.org/10.2478/v10065-011-0010-y}, doi = {10.2478/V10065-011-0010-Y}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/umcs/OszywaG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BrakerskiV11, author = {Zvika Brakerski and Vinod Vaikuntanathan}, editor = {Phillip Rogaway}, title = {Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages}, booktitle = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6841}, pages = {505--524}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22792-9\_29}, doi = {10.1007/978-3-642-22792-9\_29}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BrakerskiV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cse/YoonY11, author = {Eun{-}Jun Yoon and Kee{-}Young Yoo}, editor = {Wenyu Qu and Kai Lin and Yanming Shen and Weisong Shi and D. Frank Hsu and Xiaolong Jin and Francis C. M. Lau and Junfeng Xu}, title = {A Practical Convertible Authenticated Encryption Scheme with Message Linkages and Forward Secrecy}, booktitle = {14th {IEEE} International Conference on Computational Science and Engineering, {CSE} 2011, Dalian, China, August 24-26, 2011}, pages = {339--342}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/CSE.2011.117}, doi = {10.1109/CSE.2011.117}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cse/YoonY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ddecs/JiangEP11, author = {Ke Jiang and Petru Eles and Zebo Peng}, editor = {Rolf Kraemer and Adam Pawlak and Andreas Steininger and Mario Sch{\"{o}}lzel and Jaan Raik and Heinrich Theodor Vierhaus}, title = {Optimization of message encryption for distributed embedded systems with real-time constraints}, booktitle = {14th {IEEE} International Symposium on Design and Diagnostics of Electronic Circuits {\&} Systems, {DDECS} 2011, Cottbus, Germany, April 13-15, 2011}, pages = {243--248}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/DDECS.2011.5783087}, doi = {10.1109/DDECS.2011.5783087}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ddecs/JiangEP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/LeeC11a, author = {Namyoon Lee and Joohwan Chun}, title = {Signal Space Alignment for an Encryption Message and Successive Network Code Decoding on the {MIMO} K-Way Relay Channel}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2011, Kyoto, Japan, 5-9 June, 2011}, pages = {1--5}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/icc.2011.5963437}, doi = {10.1109/ICC.2011.5963437}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/LeeC11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icend/OwuorQ11, author = {Dennis Luke Owuor and Guoyuan Qi}, editor = {Jim James Yonazi and Eliamani Sedoyeka and Ezendu Ariwa and Eyas El{-}Qawasmeh}, title = {Message Signal Encryption Based on Qi Hyper-Chaos System}, booktitle = {e-Technologies and Networks for Development - First International Conference, ICeND 2011, Dar-es-Salaam, Tanzania, August 3-5, 2011. Proceedings}, series = {Communications in Computer and Information Science}, volume = {171}, pages = {145--155}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22729-5\_13}, doi = {10.1007/978-3-642-22729-5\_13}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icend/OwuorQ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socpar/MittalM11, author = {Varun Mittal and Piyush Murli Agarwal}, editor = {Ajith Abraham and Hongbo Liu and Fuchun Sun and Chen Guo and Se{\'{a}}n F. McLoone and Emilio Corchado}, title = {An encryption and decryption algorithm for messages transmitted by phonetic alphabets}, booktitle = {Third International Conference of Soft Computing and Pattern Recognition, SoCPaR 2011, Dalian, China, October 14-16, 2011}, pages = {1--4}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/SoCPaR.2011.6089104}, doi = {10.1109/SOCPAR.2011.6089104}, timestamp = {Wed, 20 Jan 2021 09:06:52 +0100}, biburl = {https://dblp.org/rec/conf/socpar/MittalM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icde/KarabulutWNNSDS10, author = {Y{\"{u}}cel Karabulut and Harald Weppner and Ike Nassi and Anusha Nagarajan and Yash Shroff and Nishant Dubey and Tyelisa Shields}, title = {End-to-end confidentiality for a message warehousing service using Identity-Based Encryption}, booktitle = {Workshops Proceedings of the 26th International Conference on Data Engineering, {ICDE} 2010, March 1-6, 2010, Long Beach, California, {USA}}, pages = {33--40}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ICDEW.2010.5452750}, doi = {10.1109/ICDEW.2010.5452750}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icde/KarabulutWNNSDS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/OhtakeHO10, author = {Go Ohtake and Goichiro Hanaoka and Kazuto Ogawa}, editor = {Swee{-}Huay Heng and Kaoru Kurosawa}, title = {Efficient Broadcast Encryption with Personalized Messages}, booktitle = {Provable Security - 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6402}, pages = {214--228}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16280-0\_15}, doi = {10.1007/978-3-642-16280-0\_15}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/provsec/OhtakeHO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sersc-isa/GiriBSJ10, author = {Debasis Giri and Prithayan Barua and P. D. Srivastava and Biswapati Jana}, editor = {Samir Kumar Bandyopadhyay and Wael Adi and Tai{-}Hoon Kim and Yang Xiao}, title = {A Cryptosystem for Encryption and Decryption of Long Confidential Messages}, booktitle = {Information Security and Assurance - 4th International Conference, {ISA} 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {76}, pages = {86--96}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13365-7\_9}, doi = {10.1007/978-3-642-13365-7\_9}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sersc-isa/GiriBSJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1010-0937, author = {Namyoon Lee and Joohwan Chun}, title = {Signal Space Alignment for an Encryption Message and Successive Network Code Decoding on the {MIMO} K-way Relay Channel}, journal = {CoRR}, volume = {abs/1010.0937}, year = {2010}, url = {http://arxiv.org/abs/1010.0937}, eprinttype = {arXiv}, eprint = {1010.0937}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1010-0937.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc5830, author = {Vasily Dolmatov}, title = {{GOST} 28147-89: Encryption, Decryption, and Message Authentication Code {(MAC)} Algorithms}, journal = {{RFC}}, volume = {5830}, pages = {1--19}, year = {2010}, url = {https://doi.org/10.17487/RFC5830}, doi = {10.17487/RFC5830}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc5830.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ChardinM09, author = {Thomas Chardin and Rapha{\"{e}}l Marinier}, title = {An Adaptive Chosen-plaintext Attack of the Improved Cellular Message Encryption Algorithm}, journal = {Int. J. Netw. Secur.}, volume = {9}, number = {2}, pages = {173--179}, year = {2009}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v9-n2/ijns-2009-v9-n2-p173-179.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ChardinM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/SimplicioBBCM09, author = {Marcos A. Simpl{\'{\i}}cio Jr. and Pedro d'Aquino F. F. S. Barbuda and Paulo S. L. M. Barreto and Tereza Cristina M. B. Carvalho and C{\'{\i}}ntia B. Margi}, title = {The {MARVIN} message authentication code and the {LETTERSOUP} authenticated encryption scheme}, journal = {Secur. Commun. Networks}, volume = {2}, number = {2}, pages = {165--180}, year = {2009}, url = {https://doi.org/10.1002/sec.66}, doi = {10.1002/SEC.66}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/SimplicioBBCM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bmei/Xu09, author = {Xiangyang Xu}, title = {Efficient Privacy of Message Encryption Algorithm for Anonymous Receivers in E-Commerce}, booktitle = {Proceedings of the 2nd International Conference on BioMedical Engineering and Informatics, {BMEI} 2009, October 17-19, 2009, Tianjin, China}, pages = {1--4}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/BMEI.2009.5305827}, doi = {10.1109/BMEI.2009.5305827}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/bmei/Xu09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itng/RupaA09, author = {Ch. Rupa and P. S. Avadhani}, editor = {Shahram Latifi}, title = {Message Encryption Scheme Using Cheating Text}, booktitle = {Sixth International Conference on Information Technology: New Generations, {ITNG} 2009, Las Vegas, Nevada, USA, 27-29 April 2009}, pages = {470--474}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ITNG.2009.232}, doi = {10.1109/ITNG.2009.232}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itng/RupaA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AbeKO09, author = {Masayuki Abe and Eike Kiltz and Tatsuaki Okamoto}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {Compact CCA-Secure Encryption for Messages of Arbitrary Length}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {377--392}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_21}, doi = {10.1007/978-3-642-00468-1\_21}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AbeKO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/VascoP09, author = {Mar{\'{\i}}a Isabel Gonz{\'{a}}lez Vasco and Angel L. P{\'{e}}rez del Pozo}, title = {Related Message Attacks to Public Key Encryption Schemes: Relations among Security Notions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {205}, year = {2009}, url = {http://eprint.iacr.org/2009/205}, timestamp = {Mon, 31 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/VascoP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc5409, author = {Luther Martin and Mark Schertler}, title = {Using the Boneh-Franklin and Boneh-Boyen Identity-Based Encryption Algorithms with the Cryptographic Message Syntax {(CMS)}}, journal = {{RFC}}, volume = {5409}, pages = {1--13}, year = {2009}, url = {https://doi.org/10.17487/RFC5409}, doi = {10.17487/RFC5409}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc5409.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dent09a, title = {On the Equivalence of Two Models for Key-Dependent-Message Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {572}, year = {2009}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2009/572}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dent09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/crossroads/DeHart08, author = {Ed DeHart}, title = {Data encryption: mixing up the message in the name of security}, journal = {{ACM} Crossroads}, volume = {15}, number = {1}, pages = {21--27}, year = {2008}, url = {https://doi.org/10.1145/1452012.1452017}, doi = {10.1145/1452012.1452017}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/crossroads/DeHart08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/MukhopadhyayC08, author = {Debdeep Mukhopadhyay and Dipanwita Roy Chowdhury}, title = {Customizing Cellular Message Encryption Algorithm}, journal = {Int. J. Netw. Secur.}, volume = {7}, number = {2}, pages = {193--201}, year = {2008}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v7-n2/ijns-2008-v7-n2-p193-201.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/MukhopadhyayC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BackesPS08, author = {Michael Backes and Birgit Pfitzmann and Andre Scedrov}, title = {Key-dependent message security under active attacks - BRSIM/UC-soundness of Dolev-Yao-style encryption with key cycles}, journal = {J. Comput. Secur.}, volume = {16}, number = {5}, pages = {497--530}, year = {2008}, url = {https://doi.org/10.3233/JCS-2008-0332}, doi = {10.3233/JCS-2008-0332}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BackesPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Jutla08, author = {Charanjit S. Jutla}, title = {Encryption Modes with Almost Free Message Integrity}, journal = {J. Cryptol.}, volume = {21}, number = {4}, pages = {547--578}, year = {2008}, url = {https://doi.org/10.1007/s00145-008-9024-z}, doi = {10.1007/S00145-008-9024-Z}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Jutla08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChardinM08, author = {Thomas Chardin and Rapha{\"{e}}l Marinier}, title = {Cryptanalysis of the Improved Cellular Message Encryption Algorithm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {445}, year = {2008}, url = {http://eprint.iacr.org/2008/445}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChardinM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/TzengTH07, author = {Shiang{-}Feng Tzeng and Yuan{-}Liang Tang and Min{-}Shiang Hwang}, title = {A new convertible authenticated encryption scheme with message linkages}, journal = {Comput. Electr. Eng.}, volume = {33}, number = {2}, pages = {133--138}, year = {2007}, url = {https://doi.org/10.1016/j.compeleceng.2006.02.005}, doi = {10.1016/J.COMPELECENG.2006.02.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cee/TzengTH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BackesPS07, author = {Michael Backes and Birgit Pfitzmann and Andre Scedrov}, title = {Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles}, booktitle = {20th {IEEE} Computer Security Foundations Symposium, {CSF} 2007, 6-8 July 2007, Venice, Italy}, pages = {112--124}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/CSF.2007.23}, doi = {10.1109/CSF.2007.23}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/BackesPS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc5084, author = {Russell Housley}, title = {Using {AES-CCM} and {AES-GCM} Authenticated Encryption in the Cryptographic Message Syntax {(CMS)}}, journal = {{RFC}}, volume = {5084}, pages = {1--11}, year = {2007}, url = {https://doi.org/10.17487/RFC5084}, doi = {10.17487/RFC5084}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc5084.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/HwangLHC06, author = {Min{-}Shiang Hwang and Jung{-}Wen Lo and Shu{-}Yin Hsiao and Yen{-}Ping Chu}, title = {Improvement of Authenticated Encryption Schemes with Message Linkages for Message Flows}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {89-D}, number = {4}, pages = {1575--1577}, year = {2006}, url = {https://doi.org/10.1093/ietisy/e89-d.4.1575}, doi = {10.1093/IETISY/E89-D.4.1575}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/HwangLHC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc4615, author = {JunHyuk Song and Radha Poovendran and Jicheol Lee and Tetsu Iwata}, title = {The Advanced Encryption Standard-Cipher-based Message Authentication Code-Pseudo-Random Function-128 {(AES-CMAC-PRF-128)} Algorithm for the Internet Key Exchange Protocol {(IKE)}}, journal = {{RFC}}, volume = {4615}, pages = {1--7}, year = {2006}, url = {https://doi.org/10.17487/RFC4615}, doi = {10.17487/RFC4615}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc4615.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amc/ZhangAX05, author = {Zhang Zhang and Shunsuke Araki and Guozhen Xiao}, title = {Improvement of Tseng et al.'s authenticated encryption scheme with message linkages}, journal = {Appl. Math. Comput.}, volume = {162}, number = {3}, pages = {1475--1483}, year = {2005}, url = {https://doi.org/10.1016/j.amc.2004.03.022}, doi = {10.1016/J.AMC.2004.03.022}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/amc/ZhangAX05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/HuangLLCC05, author = {Chi{-}Hsiung Huang and Chia{-}Yin Lee and Chu{-}Hsing Lin and Chin{-}Chen Chang and Kuo{-}Lun Chen}, title = {Authenticated Encryption Schemes with Message Linkage for Threshold Signatures}, booktitle = {19th International Conference on Advanced Information Networking and Applications {(AINA} 2005), 28-30 March 2005, Taipei, Taiwan}, pages = {261--264}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/AINA.2005.123}, doi = {10.1109/AINA.2005.123}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/HuangLLCC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccnmc/PengXCDP05, author = {Yin{-}Qiao Peng and Shi{-}Yi Xie and Yue{-}Feng Chen and Rui Deng and Ling{-}Xi Peng}, editor = {Xicheng Lu and Wei Zhao}, title = {A Publicly Verifiable Authenticated Encryption Scheme with Message Linkages}, booktitle = {Networking and Mobile Computing, Third International Conference, {ICCNMC} 2005, Zhangjiajie, China, August 2-4, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3619}, pages = {1271--1276}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11534310\_133}, doi = {10.1007/11534310\_133}, timestamp = {Fri, 09 Apr 2021 18:41:16 +0200}, biburl = {https://dblp.org/rec/conf/iccnmc/PengXCDP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/MukhopadhyayCNC05, author = {Debdeep Mukhopadhyay and Abhishek Chaudhary and Arvind Nebhnani and Dipanwita Roy Chowdhury}, editor = {Sushil Jajodia and Chandan Mazumdar}, title = {{CCMEA:} Customized Cellular Message Encryption Algorithm for Wireless Networks}, booktitle = {Information Systems Security, First International Conference, {ICISS} 2005, Kolkata, India, December 19-21, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3803}, pages = {217--227}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11593980\_16}, doi = {10.1007/11593980\_16}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/iciss/MukhopadhyayCNC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kes/YoonY05, author = {Eun{-}Jun Yoon and Kee{-}Young Yoo}, editor = {Rajiv Khosla and Robert J. Howlett and Lakhmi C. Jain}, title = {Robust Authenticated Encryption Scheme with Message Linkages}, booktitle = {Knowledge-Based Intelligent Information and Engineering Systems, 9th International Conference, {KES} 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {3684}, pages = {281--288}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11554028\_40}, doi = {10.1007/11554028\_40}, timestamp = {Sun, 02 Jun 2019 21:22:00 +0200}, biburl = {https://dblp.org/rec/conf/kes/YoonY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mie/HassinenL05, author = {Marko Hassinen and Pertti Laitinen}, editor = {Rolf Engelbrecht and Antoine Geissb{\"{u}}hler and Christian Lovis and George I. Mihalas}, title = {End-to-end Encryption for {SMS} Messages in the Health Care Domain}, booktitle = {Connecting Medical Informatics and Bio-Informatics - Proceedings of {MIE} 2005 - The XIXth International Congress of the European Federation for Medical Informatics, Geneva, Switzerland}, series = {Studies in Health Technology and Informatics}, volume = {116}, pages = {316--321}, publisher = {{IOS} Press}, year = {2005}, url = {http://ebooks.iospress.nl/volumearticle/10321}, timestamp = {Wed, 03 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mie/HassinenL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DodisS05, author = {Yevgeniy Dodis and Adam D. Smith}, editor = {Joe Kilian}, title = {Entropic Security and the Encryption of High Entropy Messages}, booktitle = {Theory of Cryptography, Second Theory of Cryptography Conference, {TCC} 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3378}, pages = {556--577}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30576-7\_30}, doi = {10.1007/978-3-540-30576-7\_30}, timestamp = {Sun, 02 Jun 2019 21:21:22 +0200}, biburl = {https://dblp.org/rec/conf/tcc/DodisS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesPS05, author = {Michael Backes and Birgit Pfitzmann and Andre Scedrov}, title = {Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {421}, year = {2005}, url = {http://eprint.iacr.org/2005/421}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesPS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc4010, author = {Jongwook Park and Sungjae Lee and Jeeyeon Kim and Jaeil Lee}, title = {Use of the {SEED} Encryption Algorithm in Cryptographic Message Syntax {(CMS)}}, journal = {{RFC}}, volume = {4010}, pages = {1--13}, year = {2005}, url = {https://doi.org/10.17487/RFC4010}, doi = {10.17487/RFC4010}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc4010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/Chen04, author = {Bi{-}Hui Chen}, title = {Improvements of authenticated encryption schemes with message linkages for message flows}, journal = {Comput. Electr. Eng.}, volume = {30}, number = {7}, pages = {465--469}, year = {2004}, url = {https://doi.org/10.1016/j.compeleceng.2004.07.001}, doi = {10.1016/J.COMPELECENG.2004.07.001}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/Chen04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eee/ChenHC04, author = {Tzer{-}Shyong Chen and Kuo{-}Hsuan Huang and Yu{-}Fang Chung}, title = {A Division-of-Labor-Signature (t, n) Threshold-Authenticated Encryption Scheme with Message Linkage Based on the Elliptic Curve Cryptosystem}, booktitle = {2004 {IEEE} International Conference on e-Technology, e-Commerce, and e-Services {(EEE} 04), 29-31 March 2004, Taipei, Taiwan}, pages = {106--112}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/EEE.2004.1287295}, doi = {10.1109/EEE.2004.1287295}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eee/ChenHC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareGM04, author = {Mihir Bellare and Oded Goldreich and Anton Mityagin}, title = {The Power of Verification Queries in Message Authentication and Authenticated Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {309}, year = {2004}, url = {http://eprint.iacr.org/2004/309}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareGM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisS04, author = {Yevgeniy Dodis and Adam D. Smith}, title = {Entropic Security and the Encryption of High Entropy Messages}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {219}, year = {2004}, url = {http://eprint.iacr.org/2004/219}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc3657, author = {Shiho Moriai and Akihiro Kato}, title = {Use of the Camellia Encryption Algorithm in Cryptographic Message Syntax {(CMS)}}, journal = {{RFC}}, volume = {3657}, pages = {1--14}, year = {2004}, url = {https://doi.org/10.17487/RFC3657}, doi = {10.17487/RFC3657}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc3657.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/TsengJC03, author = {Yuh{-}Min Tseng and Jinn{-}ke Jan and Hung{-}Yu Chien}, title = {Authenticated encryption schemes with message linkages for message flows}, journal = {Comput. Electr. Eng.}, volume = {29}, number = {1}, pages = {101--109}, year = {2003}, url = {https://doi.org/10.1016/S0045-7906(01)00010-6}, doi = {10.1016/S0045-7906(01)00010-6}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/TsengJC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HawkesR03, author = {Philip Hawkes and Gregory G. Rose}, title = {A Mode of Operation with Partial Encryption and Message Integrity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1}, year = {2003}, url = {http://eprint.iacr.org/2003/001}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HawkesR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Zhu03a, author = {Huafei Zhu}, title = {A Practical Elliptic Curve Public Key Encryption Scheme Provably Secure Against Adaptive Chosen-message Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {87}, year = {2003}, url = {http://eprint.iacr.org/2003/087}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Zhu03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc3537, author = {Jim Schaad and Russell Housley}, title = {Wrapping a Hashed Message Authentication Code {(HMAC)} key with a Triple-Data Encryption Standard {(DES)} Key or an Advanced Encryption Standard {(AES)} Key}, journal = {{RFC}}, volume = {3537}, pages = {1--9}, year = {2003}, url = {https://doi.org/10.17487/RFC3537}, doi = {10.17487/RFC3537}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc3537.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc3565, author = {Jim Schaad}, title = {Use of the Advanced Encryption Standard {(AES)} Encryption Algorithm in Cryptographic Message Syntax {(CMS)}}, journal = {{RFC}}, volume = {3565}, pages = {1--14}, year = {2003}, url = {https://doi.org/10.17487/RFC3565}, doi = {10.17487/RFC3565}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc3565.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/TsengJ02, author = {Yuh{-}Min Tseng and Jinn{-}ke Jan}, title = {An Efficient Authenticated Encryption Scheme With Message Linkages and Low Communication Costs}, journal = {J. Inf. Sci. Eng.}, volume = {18}, number = {1}, pages = {41--46}, year = {2002}, url = {http://www.iis.sinica.edu.tw/page/jise/2002/200201\_04.html}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/TsengJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisedu/CaoDBK02, author = {Qidong Cao and John S. Davis and Xue Bai and Orlando E. Katter Jr.}, title = {Using ASP-Based Message Encryption Project to Teach Information Security Concepts}, journal = {J. Inf. Syst. Educ.}, volume = {13}, number = {3}, pages = {183--188}, year = {2002}, url = {https://jise.org/Volume13/n3/JISEv13n3p183.html}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisedu/CaoDBK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CoronHJPPT02, author = {Jean{-}S{\'{e}}bastien Coron and Helena Handschuh and Marc Joye and Pascal Paillier and David Pointcheval and Christophe Tymen}, editor = {David Naccache and Pascal Paillier}, title = {Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages}, booktitle = {Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February 12-14, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2274}, pages = {17--33}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45664-3\_2}, doi = {10.1007/3-540-45664-3\_2}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CoronHJPPT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/BlackRS02, author = {John Black and Phillip Rogaway and Thomas Shrimpton}, editor = {Kaisa Nyberg and Howard M. Heys}, title = {Encryption-Scheme Security in the Presence of Key-Dependent Messages}, booktitle = {Selected Areas in Cryptography, 9th Annual International Workshop, {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2595}, pages = {62--75}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36492-7\_6}, doi = {10.1007/3-540-36492-7\_6}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/BlackRS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlackRS02a, author = {John Black and Phillip Rogaway and Thomas Shrimpton}, title = {Encryption-Scheme Security in the Presence of Key-Dependent Messages}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {100}, year = {2002}, url = {http://eprint.iacr.org/2002/100}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlackRS02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CoronHJPPT02, author = {Jean{-}S{\'{e}}bastien Coron and Helena Handschuh and Marc Joye and Pascal Paillier and David Pointcheval and Christophe Tymen}, title = {Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {11}, year = {2002}, url = {http://eprint.iacr.org/2002/011}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CoronHJPPT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Jutla01, author = {Charanjit S. Jutla}, editor = {Birgit Pfitzmann}, title = {Encryption Modes with Almost Free Message Integrity}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2001, International Conference on the Theory and Application of Cryptographic Techniques, Innsbruck, Austria, May 6-10, 2001, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {2045}, pages = {529--544}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44987-6\_32}, doi = {10.1007/3-540-44987-6\_32}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Jutla01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RussellW01, author = {Alexander Russell and Hong Wang}, title = {Efficient Encryption for Rich Message Spaces Under General Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {28}, year = {2001}, url = {http://eprint.iacr.org/2001/028}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RussellW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Jutla00, author = {Charanjit S. Jutla}, title = {Encryption Modes with Almost Free Message Integrity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {39}, year = {2000}, url = {http://eprint.iacr.org/2000/039}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Jutla00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Law00, author = {Tak{-}Ming Law}, title = {An Encryption Algorithm and Key-stream Generator for Chinese Text Messages by Character Internal Code Structure}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {6}, year = {2000}, url = {http://eprint.iacr.org/2000/006}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Law00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MitomoK00, author = {Masashi Mitomo and Kaoru Kurosawa}, title = {How to Encrypt Long Messages without Large Size Symmetric/Asymmetric Encryption Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {65}, year = {2000}, url = {http://eprint.iacr.org/2000/065}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MitomoK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/Yeun99, author = {Chan Yeob Yeun}, editor = {Michael Walker}, title = {Digital Signature with Message Recovery and Authenticated Encryption (Signcryption) - {A} Comparison}, booktitle = {Cryptography and Coding, 7th {IMA} International Conference, Cirencester, UK, December 20-22, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1746}, pages = {307}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-46665-7\_35}, doi = {10.1007/3-540-46665-7\_35}, timestamp = {Wed, 18 Mar 2020 16:00:59 +0100}, biburl = {https://dblp.org/rec/conf/ima/Yeun99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/LeeC97, author = {Wei{-}Bin Lee and Chin{-}Chen Chang}, title = {Authenticated Encryption Schemes with Linkage Between Message Blocks}, journal = {Inf. Process. Lett.}, volume = {63}, number = {5}, pages = {247--250}, year = {1997}, url = {https://doi.org/10.1016/S0020-0190(97)00118-X}, doi = {10.1016/S0020-0190(97)00118-X}, timestamp = {Tue, 23 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ipl/LeeC97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/HwangCY96, author = {Shin{-}Jia Hwang and Chin{-}Chen Chang and Wei{-}Pang Yang}, title = {Autenticated Encryption Schemes with Message Linkage}, journal = {Inf. Process. Lett.}, volume = {58}, number = {4}, pages = {189--195}, year = {1996}, url = {https://doi.org/10.1016/0020-0190(96)00032-4}, doi = {10.1016/0020-0190(96)00032-4}, timestamp = {Tue, 23 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ipl/HwangCY96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/FranklinH96, author = {Matthew K. Franklin and Stuart Haber}, title = {Joint Encryption and Message-Efficient Secure Computation}, journal = {J. Cryptol.}, volume = {9}, number = {4}, pages = {217--232}, year = {1996}, url = {https://doi.org/10.1007/BF00189261}, doi = {10.1007/BF00189261}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/FranklinH96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FranklinH93, author = {Matthew K. Franklin and Stuart Haber}, editor = {Douglas R. Stinson}, title = {Joint Encryption and Message-Efficient Secure Computation}, booktitle = {Advances in Cryptology - {CRYPTO} '93, 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {773}, pages = {266--277}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48329-2\_23}, doi = {10.1007/3-540-48329-2\_23}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/FranklinH93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc1421, author = {John Linn}, title = {Privacy Enhancement for Internet Electronic Mail: Part {I:} Message Encryption and Authentication Procedures}, journal = {{RFC}}, volume = {1421}, pages = {1--42}, year = {1993}, url = {https://doi.org/10.17487/RFC1421}, doi = {10.17487/RFC1421}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc1421.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Christoffersson88, author = {Per Christoffersson}, title = {Message authentication and encryption combined}, journal = {Comput. Secur.}, volume = {7}, number = {1}, pages = {65--71}, year = {1988}, url = {https://doi.org/10.1016/0167-4048(88)90505-6}, doi = {10.1016/0167-4048(88)90505-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Christoffersson88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/MatsumotoI88, author = {Tsutomu Matsumoto and Hideki Imai}, editor = {Christoph G. G{\"{u}}nther}, title = {Public Quadratic Polynominal-Tuples for Efficient Signature-Verification and Message-Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} '88, Workshop on the Theory and Application of of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {330}, pages = {419--453}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/3-540-45961-8\_39}, doi = {10.1007/3-540-45961-8\_39}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/MatsumotoI88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.