Login / Signup
EKE Meets Tight Security in the Universally Composable Framework.
Xiangyu Liu
Shengli Liu
Shuai Han
Dawu Gu
Published in:
Public Key Cryptography (1) (2023)
Keyphrases
</>
main contribution
worst case
neural network
machine learning
lower bound
upper bound
information retrieval
probabilistic model
intrusion detection
operating system