Login / Signup

Exploiting the Leakage: Analysis of Some Authenticated Encryption Schemes.

Donghoon ChangAmit Kumar ChauhanNaina GuptaArpan JatiSomitra Kumar Sanadhya
Published in: SPACE (2016)
Keyphrases
  • multiscale
  • database
  • digital libraries
  • data analysis
  • motion estimation