Login / Signup
Hash Based Encryption Schemes Using Physically Unclonable Functions.
Dina Ghanai Miandaob
Duane Booher
Bertrand Cambou
Sareh Assiri
Published in:
SAI (3) (2022)
Keyphrases
</>
encryption scheme
hash functions
standard model
proxy re encryption
image compression
similarity search
lossless compression
security analysis
ciphertext
encryption key
public key encryption
database management systems
quadtree
security model