Login / Signup

On the soundness of authenticate-then-encrypt: formalizing the malleability of symmetric encryption.

Ueli MaurerBjörn Tackmann
Published in: CCS (2010)
Keyphrases
  • secret key
  • key management
  • copyright protection
  • ciphertext
  • encryption scheme
  • encryption decryption
  • data mining
  • digital images
  • sensitive data
  • encryption algorithm