Sign in

Leakage-Resilient Authenticated Encryption from Leakage-Resilient Pseudorandom Functions.

Juliane KrämerPatrick Struck
Published in: COSADE (2020)
Keyphrases
  • pseudorandom
  • random number
  • secret key
  • encryption algorithm
  • key exchange
  • authentication scheme
  • real time
  • random numbers
  • encryption decryption
  • low cost
  • public key
  • key distribution