Login / Signup
Protecting Cryptographic Keys against Continual Leakage.
Ali Juma
Yevgeniy Vahlis
Published in:
CRYPTO (2010)
Keyphrases
</>
hash functions
smart card
secret key
encryption key
access control
key management
security protocols
neural network
similarity search
random number generator
encryption scheme
digital signature
inference control
packet filtering
database
information security
learning algorithm
databases