Article Comments

Contributions from readers on our articles are very welcome. This form will let us retrieve the current data in the database and allows us to consider your comments.

A new authenticated encryption technique for handling long ciphertexts in memory constrained devices
Megha Agrawal; Donghoon Chang; Somitra Kumar Sanadhya
International Journal of Applied Cryptography (IJACT), 2017 Vol.3 No.3, pp.236 - 261
13 - 9 =

Thank you for your feedback.