Cited By
View all- Grassi LMennink B(2022)Security of Truncated Permutation Without Initial ValueAdvances in Cryptology – ASIACRYPT 202210.1007/978-3-031-22966-4_21(620-650)Online publication date: 5-Dec-2022
- Gunsing A(2022)Block-Cipher-Based Tree HashingAdvances in Cryptology – CRYPTO 202210.1007/978-3-031-15985-5_8(205-233)Online publication date: 15-Aug-2022
- Hassan JShehzad DUllah IAlgarni FAftab MAsghar Khan MUddin M(2021)A Lightweight Proxy Re-Encryption Approach with Certificate-Based and Incremental Cryptography for Fog-Enabled E-HealthcareSecurity and Communication Networks10.1155/2021/93638242021Online publication date: 1-Jan-2021
- Show More Cited By