Login / Signup
Weak Key Authenticity and the Computational Completeness of Formal Encryption.
Omer Horvitz
Virgil D. Gligor
Published in:
CRYPTO (2003)
Keyphrases
</>
digital images
high security
real time
image encryption
data encryption standard
databases
mathematical programming
neural network
social networks
case study
computational power
encryption algorithms