Login / Signup
Note on the RKA security of Continuously Non-Malleable Key-Derivation Function from PKC 2015.
Eiichiro Fujisaki
Keita Xagawa
Published in:
IACR Cryptol. ePrint Arch. (2015)
Keyphrases
</>
high security
private key
public key
real time
security requirements
piecewise linear
image encryption
security analysis
data mining
security policies
statistical databases
encryption scheme
security mechanisms
key management
computer security
security management