Sign in

Construction of a key-dependent message secure symmetric encryption scheme in the ideal cipher model.

Qiqi LaiYuan ChenYupu HuBaocang WangMingming Jiang
Published in: Frontiers Comput. Sci. (2014)
Keyphrases
  • encryption scheme
  • database
  • digital libraries
  • information sharing
  • security analysis