Login / Signup

Fooling an Unbounded Adversary with a Short Key, Repeatedly: The Honey Encryption Perspective.

Xinze LiQiang TangZhenfeng Zhang
Published in: ITC (2021)
Keyphrases
  • neural network
  • high security
  • data encryption standard
  • database
  • machine learning
  • information systems
  • encryption scheme
  • digital signature
  • security properties
  • private key