Sciweavers

A Weakness in Authenticated Encryption Schemes Based on Tseng et al.'s Schemes
Recent academic inistitutions visiting this post, which is a subset of the total traffic
A Weakness in Authenticated Encryption Schemes Based on Tseng et al.'s Schemes
Data is not available yet.