Login / Signup
Misuse Resistant Parallel Authenticated Encryptions.
Nilanjan Datta
Mridul Nandi
Published in:
IACR Cryptol. ePrint Arch. (2013)
Keyphrases
</>
parallel processing
parallel implementation
parallel programming
computer architecture
database
multi core processors
key exchange protocol
real time
data sets
neural network
case study
anomaly detection
parallel computing
authentication scheme