Cited By
View all- Zhang XShen YWang LLuo BLiao XXu JKirda ELie D(2024)Multi-User Security of CCM Authenticated Encryption ModeProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3670385(4331-4345)Online publication date: 2-Dec-2024
- Degabriele JGilcher JGovinden JPaterson K(2024)SoK: Efficient Design and Implementation of Polynomial Hash Functions over Prime Fields2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00132(3128-3146)Online publication date: 19-May-2024
- Bhole MKastner WSauter T(2024)Towards Unveiling Vulnerabilities and Securing IoT Devices: An Ontology-Based Approach2024 IEEE 29th International Conference on Emerging Technologies and Factory Automation (ETFA)10.1109/ETFA61755.2024.10710882(1-8)Online publication date: 10-Sep-2024
- Show More Cited By