Abstract
We present the family of authenticated encryption schemes SKINNY-AEAD and the family of hashing schemes SKINNY-Hash. All of the schemes employ a membe......
小提示:本篇文献需要登录阅读全文,点击跳转登录