Xiaoqian Li, Peng Wang, Bao Li, Zhelei Sun. Cryptanalysis of Three Authenticated Encryption Schemes for Wireless Sensor Networks. In Dongdai Lin, Shouhuai Xu, Moti Yung, editors, Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers. Volume 8567 of Lecture Notes in Computer Science, pages 395-406, Springer, 2013. [doi]
@inproceedings{LiWLS13, title = {Cryptanalysis of Three Authenticated Encryption Schemes for Wireless Sensor Networks}, author = {Xiaoqian Li and Peng Wang and Bao Li and Zhelei Sun}, year = {2013}, doi = {10.1007/978-3-319-12087-4_25}, url = {http://dx.doi.org/10.1007/978-3-319-12087-4_25}, researchr = {https://researchr.org/publication/LiWLS13}, cites = {0}, citedby = {0}, pages = {395-406}, booktitle = {Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers}, editor = {Dongdai Lin and Shouhuai Xu and Moti Yung}, volume = {8567}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {978-3-319-12086-7}, }