Next Article in Journal
Trusted Time-Based Verification Model for Automatic Man-in-the-Middle Attack Detection in Cybersecurity
Next Article in Special Issue
CMCC: Misuse Resistant Authenticated Encryption with Minimal Ciphertext Expansion
Previous Article in Journal
An Attack Bound for Small Multiplicative Inverse of φ(N) mod e with a Composed Prime Sum p + q Using Sublattice Based Techniques
Previous Article in Special Issue
The Definition and Software Performance of Hashstream, a Fast Length-Flexible PRF
 
 

Order Article Reprints

Journal: Cryptography, 2018
Volume: 2
Number: 37

Article: Deterministic Authenticated Encryption Scheme for Memory Constrained Devices
Authors: by Megha Agrawal, Donghoon Chang and Jinkeon Kang
Link: https://www.mdpi.com/2410-387X/2/4/37

MDPI offers high quality article reprints with convenient shipping to destinations worldwide. Each reprint features a 270 gsm bright white cover and 105 gsm premium white paper, bound with two stitches for durability and printed in full color. The cover design is customized to your article and designed to be complimentary to the journal.

Order Cost and Details

Shipping Address

Billing Address

Notes or Comments

Validate and Place Order

The order must be prepaid after it is placed

req denotes required fields.
Back to TopTop