Login / Signup
The ring authenticated encryption scheme - How to provide a clue wisely.
Jiqiang Lv
Kui Ren
Xiaofeng Chen
Kwangjo Kim
Published in:
Inf. Sci. (2009)
Keyphrases
</>
encryption scheme
high quality
digital libraries
bit rate
public key
security analysis