Login / Signup
Fooling an Unbounded Adversary with a Short Key, Repeatedly: The Honey Encryption Perspective.
Xinze Li
Qiang Tang
Zhenfeng Zhang
Published in:
ITC (2021)
Keyphrases
</>
neural network
high security
data encryption standard
database
machine learning
information systems
encryption scheme
digital signature
security properties
private key