Login / Signup
Safeguarding cryptographic keys.
G. R. Blakley
Published in:
MARK (1979)
Keyphrases
</>
hash functions
smart card
secret key
key management
similarity search
order preserving
secure communication
data sets
data distribution
encryption scheme
security protocols
public key cryptography
arbitrary length
random number generators