Login / Signup
Between Hashed DH and Computational DH: Compact Encryption from Weaker Assumption.
Goichiro Hanaoka
Kaoru Kurosawa
Published in:
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. (2010)
Keyphrases
</>
real time
social networks
lower bound
neural network
computer vision
information systems
video sequences
key management
cutting plane