Login / Signup
How to Encrypt with a Malicious Random Number Generator.
Seny Kamara
Jonathan Katz
Published in:
FSE (2008)
Keyphrases
</>
random number generator
random number
secret key
malicious attacks
key management
malicious behavior
fingerprint authentication
detect malicious
pseudorandom
ciphertext
copyright protection
malicious users
lightweight
insider threat
encryption scheme
shift register
query processing
data sets