Login / Signup
On the (Im)Possibility of Key Dependent Encryption.
Iftach Haitner
Thomas Holenstein
Published in:
TCC (2009)
Keyphrases
</>
high security
data encryption standard
encryption algorithms
computer vision
information systems
case study