Login / Signup
Authenticated Encryption with Key Identification.
Julia Len
Paul Grubbs
Thomas Ristenpart
Published in:
IACR Cryptol. ePrint Arch. (2022)
Keyphrases
</>
key exchange
high security
private key
key exchange protocol
data encryption standard
databases
search engine
key technologies
secret key
key distribution
block cipher
secure communication
encryption algorithms