Login / Signup
A Note on Lower Bounds for Non-interactive Message Authentication Using Weak Keys.
Divesh Aggarwal
Alexander Golovnev
Published in:
IACR Cryptol. ePrint Arch. (2015)
Keyphrases
</>
lower bound
upper bound
branch and bound algorithm
objective function
user interaction
lower and upper bounds
upper and lower bounds
vc dimension
email
computer graphics
digital watermarking