Sign in

Authenticated Encryption with Key Identification.

Julia LenPaul GrubbsThomas Ristenpart
Published in: ASIACRYPT (3) (2022)
Keyphrases
  • key exchange
  • high security
  • case study
  • automatic identification
  • key management
  • private key
  • key exchange protocol
  • data sets
  • information systems
  • key distribution