. . . . . .
Permutation-based encryption, authentication and authenticated encryption
Permutation-based encryption, authentication and authenticated encryption
Joan Daemen1 Joint work with Guido Bertoni1, Michaël Peeters2 and Gilles Van Assche1
1STMicroelectronics 2NXP Semiconductors