Login / Signup

Weak Key Authenticity and the Computational Completeness of Formal Encryption.

Omer HorvitzVirgil D. Gligor
Published in: CRYPTO (2003)
Keyphrases
  • digital images
  • high security
  • real time
  • image encryption
  • data encryption standard
  • databases
  • mathematical programming
  • neural network
  • social networks
  • case study
  • computational power
  • encryption algorithms