Sciweavers

A Weakness in Authenticated Encryption Schemes Based on Tseng et al.'s Schemes
Recent Google, Yahoo, MSN search queries leading to this post
A Weakness in Authenticated Encryption Schemes Based on Tseng et al.'s Schemes
Data is not available yet.