Login / Signup
Between Hashed DH and Computational DH: Compact Encryption from Weaker Assumption.
Goichiro Hanaoka
Kaoru Kurosawa
Published in:
IACR Cryptol. ePrint Arch. (2010)
Keyphrases
</>
data sets
encryption algorithms
real time
machine learning
learning algorithm
search engine
knowledge base
image encryption
data encryption