Login / Signup
Exploiting the Leakage: Analysis of Some Authenticated Encryption Schemes.
Donghoon Chang
Amit Kumar Chauhan
Naina Gupta
Arpan Jati
Somitra Kumar Sanadhya
Published in:
SPACE (2016)
Keyphrases
</>
multiscale
database
digital libraries
data analysis
motion estimation