Deterministic Encryption with the Thorp Shuffle.
Ben MorrisPhillip RogawayTill StegersPublished in: J. Cryptol. (2018)
Keyphrases
- secret key
- databases
- data mining
- decision trees
- encryption scheme
- digital signature
- information hiding
- image encryption
- security properties
- multimedia streaming
- encryption decryption
- data encryption
- key exchange
- randomized algorithms
- data protection
- encryption algorithm
- ciphertext
- security analysis
- relational databases
- case study
- metadata
- neural network