Login / Signup
Secure Applications of Low-Entropy Keys.
John Kelsey
Bruce Schneier
Chris Hall
David A. Wagner
Published in:
ISW (1997)
Keyphrases
</>
information theory
mutual information
private key
information theoretic
lightweight
high levels
database
security requirements
information entropy
security analysis
key establishment
real time
secret key
entropy measure
fuzzy entropy