Login / Signup
Joint Signature and Encryption in the Presence of Continual Leakage.
Fei Tang
Hongda Li
Published in:
WISA (2014)
Keyphrases
</>
digital signature
signature recognition
key management
encryption algorithms
image encryption
encryption scheme
public key
information systems
information retrieval
data structure
website
data sets
ciphertext
private key
search engine
joint estimation
high security
databases