Report copyright - Concealment and its Applications to Authenticated Encryptiondodis/ps/conceal-survey.pdfrecently designed modes of operation for authenticated encryption, such as IACBC [21] or OCB
Please pass captcha verification before submit form