Cryptanalysis of Three Authenticated Encryption Schemes for Wireless Sensor Networks

Xiaoqian Li, Peng Wang, Bao Li, Zhelei Sun. Cryptanalysis of Three Authenticated Encryption Schemes for Wireless Sensor Networks. In Dongdai Lin, Shouhuai Xu, Moti Yung, editors, Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers. Volume 8567 of Lecture Notes in Computer Science, pages 395-406, Springer, 2013. [doi]

@inproceedings{LiWLS13,
  title = {Cryptanalysis of Three Authenticated Encryption Schemes for Wireless Sensor Networks},
  author = {Xiaoqian Li and Peng Wang and Bao Li and Zhelei Sun},
  year = {2013},
  doi = {10.1007/978-3-319-12087-4_25},
  url = {http://dx.doi.org/10.1007/978-3-319-12087-4_25},
  researchr = {https://researchr.org/publication/LiWLS13},
  cites = {0},
  citedby = {0},
  pages = {395-406},
  booktitle = {Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers},
  editor = {Dongdai Lin and Shouhuai Xu and Moti Yung},
  volume = {8567},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  isbn = {978-3-319-12086-7},
}