Login / Signup
Authenticated Encryption with Key Identification.
Julia Len
Paul Grubbs
Thomas Ristenpart
Published in:
ASIACRYPT (3) (2022)
Keyphrases
</>
key exchange
high security
case study
automatic identification
key management
private key
key exchange protocol
data sets
information systems
key distribution