Login / Signup
On the CCA1-Security of Elgamal and Damgård's Elgamal.
Helger Lipmaa
Published in:
Inscrypt (2010)
Keyphrases
</>
security requirements
security issues
canonical correlation analysis
information security
computer security
case study
intrusion detection
network security
security policies
information assurance
neural network
access control
computer networks
security protocols