Login / Signup
Evolution of the Polar Code-Based Encryption Schemes.
Chen An
Ying Liu
Xianhui Lu
Published in:
GLOBECOM (Workshops) (2021)
Keyphrases
</>
encryption scheme
standard model
security analysis
public key
secret key
ciphertext
security model
secret sharing scheme
proxy re encryption
public key encryption
database management systems
cca secure