Login / Signup
Authenticated Encryption Mode IAPM using SHA-3's Public Random Permutation.
Charanjit S. Jutla
Published in:
IACR Cryptol. ePrint Arch. (2018)
Keyphrases
</>
key exchange
hash functions
random number
encryption scheme
information technology
secret key
security analysis
key exchange protocol
data sets
information hiding
public space
database
neural network
authentication scheme
data encryption