Login / Signup

EKE Meets Tight Security in the Universally Composable Framework.

Xiangyu LiuShengli LiuShuai HanDawu Gu
Published in: Public Key Cryptography (1) (2023)
Keyphrases
  • main contribution
  • worst case
  • neural network
  • machine learning
  • lower bound
  • upper bound
  • information retrieval
  • probabilistic model
  • intrusion detection
  • operating system