Login / Signup
Multi-Key Authenticated Encryption with Corruptions: Reductions are Lossy.
Tibor Jager
Martijn Stam
Ryan Stanley-Oakes
Bogdan Warinschi
Published in:
IACR Cryptol. ePrint Arch. (2017)
Keyphrases
</>
key exchange
high security
encryption algorithms
data encryption standard
image encryption
secret key
secure communication