Login / Signup
The Second Crypto War - What's Different Now.
Susan Landau
Published in:
USENIX Security Symposium (2018)
Keyphrases
</>
world war ii
security protocols
digital signature
databases
artificial intelligence
computational complexity
relational databases
low cost
resource constrained
low power consumption