Login / Signup

On the Feasibility of Unclonable Encryption, and More.

Prabhanjan AnanthFatih KaleogluXingjian LiQipeng LiuMark Zhandry
Published in: CoRR (2022)
Keyphrases
  • encryption scheme
  • identity authentication
  • practical application
  • secret key
  • encryption algorithms
  • knowledge base
  • case study
  • data structure
  • wireless sensor networks
  • key exchange
  • random number
  • multimedia streaming