Login / Signup
Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles.
Michael Backes
Birgit Pfitzmann
Andre Scedrov
Published in:
IACR Cryptol. ePrint Arch. (2005)
Keyphrases
</>
high security
access control
security protocols
block cipher
security analysis
cyber attacks
security problems
encryption algorithms