Inproceedings,

Chained Stream Authentication.

, , and .
Selected Areas in Cryptography, volume 2012 of Lecture Notes in Computer Science, page 144-157. Springer, (2000)

Meta data

Tags

Users

  • @dblp

Comments and Reviews