Login / Signup
On the Feasibility of Unclonable Encryption, and More.
Prabhanjan Ananth
Fatih Kaleoglu
Xingjian Li
Qipeng Liu
Mark Zhandry
Published in:
CoRR (2022)
Keyphrases
</>
encryption scheme
identity authentication
practical application
secret key
encryption algorithms
knowledge base
case study
data structure
wireless sensor networks
key exchange
random number
multimedia streaming