Login / Signup
On the soundness of authenticate-then-encrypt: formalizing the malleability of symmetric encryption.
Ueli Maurer
Björn Tackmann
Published in:
CCS (2010)
Keyphrases
</>
secret key
key management
copyright protection
ciphertext
encryption scheme
encryption decryption
data mining
digital images
sensitive data
encryption algorithm