Login / Signup
On Protecting Cryptographic Keys Against Continual Leakage.
Ali Juma
Yevgeniy Vahlis
Published in:
IACR Cryptol. ePrint Arch. (2010)
Keyphrases
</>
hash functions
smart card
secret key
access control
encryption scheme
key management
case study
security protocols
encryption key
database design
data distribution
ciphertext
arbitrary length
random number generator
data leakage prevention