Login / Signup
Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles.
Michael Backes
Birgit Pfitzmann
Andre Scedrov
Published in:
CSF (2007)
Keyphrases
</>
high security
block cipher
secure communication
encryption algorithms
security analysis
cyber attacks
java card
private key
image encryption