Login / Signup
Spooky Encryption and its Applications.
Yevgeniy Dodis
Shai Halevi
Ron D. Rothblum
Daniel Wichs
Published in:
IACR Cryptol. ePrint Arch. (2016)
Keyphrases
</>
encryption algorithms
data encryption
key management
information hiding
image encryption
chaotic sequence
key exchange
high security
encryption scheme
case study
public key cryptography
security properties
ciphertext
identity authentication
digital rights management
secret key
low cost
data structure