Login / Signup

On the (Im)Possibility of Key Dependent Encryption.

Iftach HaitnerThomas Holenstein
Published in: TCC (2009)
Keyphrases
  • high security
  • data encryption standard
  • encryption algorithms
  • computer vision
  • information systems
  • case study